Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

Cybersecurity Intensive

Course Programme
The Course
1 Ops 301 - Networking and Systems
Administration

2 Ops 401 - Cybersecurity Engineering


1 Ops 301 - Networking
and Systems Administration
Ops 301 - Networking and
Systems Administration
This course integrates practical network and systems administration operations such
as network design and troubleshooting, VPN tunneling, firewall configuration, network
security, server deployment and configuration, user identity management, scripting &
automation, and system health monitoring.

1.0 2.0 3.0 4.0 5.0


Networking Network Network Network Network
Fundamentals Implementations Operations Security Troubleshooting
Ops 301 - Networking and
Systems Administration
Students will be will substantially prepared to achieve the learning objectives of
CompTIA Network+ certification. This course covers significant aspects of all five
domains required for Network+.

1.0 2.0 3.0 4.0 5.0


Networking Network Network Network Network
Fundamentals Implementations Operations Security Troubleshooting
Programme
Systems Administration
- Agile project management
- Linux and Windows network services, like AD, DHCP, DNS, email, LDAP, web servers
- LAN connectivity to cloud resources on AWS
- Identity management
- IT infrastructure and systems design
- Microsoft Windows Server 2019
- Patch management
- Software administration
- Virtual machine administration
Programme
Networking
- Router and firewall administration with pfSense
- Network traffic analysis tools
- Network access controls
- Network design
- Network infrastructure troubleshooting
- Network service administration (TCP/IP, DHCP, DNS)
- Virtual private network(VPN) client and tunnel

Scripting & Automation


- Bash
- OS task automation
- Powershell
- Python
2 Ops 401 - Cybersecurity
Engineering
Ops 401 - Cybersecurity Engineering
In this intensive course, students will delve into critical topics like cyber frameworks,
data encryption, cloud security, network security, threat modeling, shell scripting,
vulnerability scanning, and incident response and gain valuable ethical hacker skills in
penetration testing.

1.0 2.0 3.0 4.0 5.0 6.0


Threats, Technologies Architecture Identity Risk Cryptography
Attacks, and and Tools and Design and Access management and PKI
Vulnerabilities Management
Ops 401 - Cybersecurity Engineering
Students will be substantially prepared to achieve the learning objectives of CompTIA
Security+ certification. This course covers significant aspects of all six domains
required for Security+.

1.0 2.0 3.0 4.0 5.0 6.0


Threats, Technologies Architecture Identity Risk Cryptography
Attacks, and and Tools and Design and Access management and PKI
Vulnerabilities Management
Programme
Governance, Risk, and Compliance (GRC)
- Cybersecurity frameworks (e.g. SOC2)
- CIA triad
- Systems hardening
- Risk analysis, assessment, and reporting
- Security compliance and auditing

Data Security
- Data classification
- Data loss prevention (DLP)
- Data privacy concepts and regulation (GDPR, CCPA)
- Encryption standards
- Password security
- Protecting data at rest and in transit
- Public Key Infrastructure (PKI)
- SSL/TLS
Programme
SecOps Foundations
- Threat detection with IDS, SIEM
- Incident response lifecycle
- Indicators of compromise (IOC)
- SIEM deployment and operation
- SIEM log and event analysis
- SIEM troubleshooting, data ingestion, query writing
- Threat hunting techniques

Cloud Security
- Cloud identity and access management
- Cloud security in AWS
- Data loss prevention (DLP)
- Intrusion detection & prevention systems (IDS/IPS, Snort)
- Network traffic analysis
- Virtual private cloud (VPC)
- AWS native tooling (e.g. AWS CloudTrail)
Programme
Threat Modeling and Analysis
- Tactics, techniques, and procedures (TTPs)
- Cyber Kill-Chain
- MITRE ATT&CK
- OWASP
- STRIDE
- Threat Modeling
- Data flow diagrams

SecOps: Threat Hunting


- Malware detection with YARA rules, VirusTotal API
- Malware traffic analysis
- Forensic investigation
- Threat hunting with Zeek, RITA
Programme
AppSec and Vulnerability Analysis
- Web app scanning and exploitation with Burp Suite, w3af, OWASP ZAP
- CVE, CVSS
- Network and application vulnerability scans and assessments
- Scanner output handling, false positives, prioritization
- Vulnerability risk rating
- Vulnerability types and concepts
Programme
Penetration Testing
- Enumeration
- Exploitation
- Impact analysis
- Investigation and intelligence collection
- Legal considerations in pentest scoping
- Nmap, metasploit, datasploit
- OSINT
- Penetration test lifecycle
- Planning
- Scoping
- Target profiling and evaluation

You might also like