ABOUT
Step into the frontline of digital defense with our "Cybersecurity Engineering and Operations" course. Tailored for those aiming to master the intricate layers of cybersecurity, this course delves deep into the engineering and operational aspects of protecting digital realms. Participants will gain insights into advanced security architectures, threat mitigation strategies, and real-world operational techniques. Whether you're an aspiring cybersecurity professional or an IT expert looking to specialize in security, this course will arm you with the knowledge and skills to architect, implement, and maintain robust cybersecurity solutions. Embark on a journey to fortify digital fortresses and stand guard in the ever-evolving cyberspace!
CURRICULUM
Networking Fundamentals
OSI model and TCP/IP
IP addressing and Subnetting
Routing and Switching Concepts
Network Protocols (HTTP, DNS, SMTP, SNMP, etc)
Network Security Protocols (SSL/TLS, Ipsec)
Cyber Threats and Attacks
MITRE ATT&CK Framework
Malware Types (Viruses, Worms, Trojans, Ransomware)
Phishing and Social Engineering Attacks
Denial of Service (DoS) and Distributed DoS (DDoS)
Man-in-the-Middle Attacks
​
​
System Hardening Techniques and Security Best Practices
Server Hardening Techniques
Software Patch Management
Secure Configuration Management
Least Privilege Principle
​
​
​
Vulnerability Management and Remediation
Vulnerability Scanning
Profiling
Vulnerability Remediation
0 day vulnerabilities and mitigation controls
​
​
​
​
​
Operating System Security
Windows Security Features and Policies
Linux Security Mechanisms
User and Group permissions
Secure Boot and File Integrity Monitoring
Network Security
Firewall Configuration and Management
DNS Security
Intrusion Detection and Prevention Systems (IDS/IPS)
Virtual Private Networks (VPNs)
Network Access Control (NAC)
Logging and False Positive Analysis (SIEM)
Penetration Testing
Incident Response and Forensics
Incident Handling and Response Process
Evidence Collection and Preservation
Forensics Tools and Techniques
Chain of Custody and Legal Considerations
Cloud Infrastructure Security
Cloud Infrastructure Overview
Cloud Networking
Cloud Infrastructure Security Controls
DevOps and DevSecOps in Cloud environment
Cloud Infrastructure Misconfigurations
Cloud Infrastructure Compliance
Cloud Infrastructure Monitoring and Optimization
​
Cryptography and Encryption
Symmetric Encryption (AES, DES, 3DES)
Assymetric Encryption (RSA, ECC)
Hash Functions (SHA, MD5)
Digital Signatures and Certificates
​
​
Web Application Security
OWASP Top 10 Vulnerabilities
Input Validation and Output Encoding
Secure Session Management
Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF)
​
​
​
​
​
Data Security
Data Discovery and Classification
Data Encryption
Data Loss Prevention
Data Privacy
Data Backup
​
​
​