- The basics of cybersecurity
- Importance of cybersecurity
- Careers in cybersecurity
- Basic hardware and boot devices
- Challenges on Enterprise Cyber Attack
- Prerequisites for Cyber Security career
- Power-On Self Test (POST)
- Basic Input/Output System (BIOS)
- Unified Extensible Firmware Interface (UEFI)
- Network Interface Card (NIC)
- Firmware
- Virtualization
- Redundant Array of Independent/Inexpensive Disks
- (RAID)
- Network Attached Storage (NAS)
- Hard Disk Drives (HDD), Solid-State Drive (SSD),
- Non-Volatile Memory express (NVMe)
- Home
- Skill Lync
- Courses
- Foundations of Cybersecurity
Online
8 Weeks
Quick facts
particular | details | |
---|---|---|
Medium of instructions
English
|
Mode of learning
Self study
|
Mode of Delivery
Video and Text Based
|
Course and certificate fees
certificate availability
Yes
certificate providing authority
Skill Lync
The syllabus
Week 1 - Introduction to Cybersecurity Hardware Basics
Week 2 - Networking Basics
- Router and its usage
- Firewall
- Private and Public Internet Protocol (IP)
- Protocol
- Open Systems Interconnection (OSI) Layer
- Introduction to Networking
- Router, Switch, Firewall, Wi-Fi
- Access Point vs Range Extender
- IPV4 / IPV6
- Private and Public IP
- MAC Address
- Protocol
- OSI Layer
- Attack patterns based on OSI Layer
Week 3 - Networking
- Intrusion Detection System (IDS), Intrusion Prevention System (IPS)
- Unicast, Broadcast, Multicast
- Automatic Private IP Adressing (APIPA)
- Transmission Control Protocol (TCP) 3 Way Handshake
- Address Resolution Protocol (ARP)/Reverse Address Resolution Protocol (RARP)
- Port Number and Well Known Ports
- Network Address Translation (NAT)/Value-Added Network (VAN)
Week 4 - Windows
- Server types
- Workgroup Vs. Domain
- User Account Control Usage
- What a server is and its function
- Windows server roles and usage
- Products used in windows server
- Workgroup Vs Domain
- User Account Control usage
- Bitlocker functionality
- Event Viewer usage
- PowerShell in windows
- Basic windows commands
Week 5 - Linux
- Linux and its features
- Linux Distros
- Directory structure
- File systems
- Linux basic commands
- Linux and its structure
- The list of features in Linux
- Linux distributions and its types
- Linux directory and file structure
- Linux basic commands
- Networking based commands in linux
- Kali linux and its features
Week 6 - Security Part 1
- Types of hackers
- Sources of cybersecurity threats
- Types of malware and its classifications
- Difference between virus/spam and its working scenario
- Raise of spyware, adware, and keylogger
- Ransomware working and types
- Phishing, Denial of Service (DoS), and Distributed Denial of Service (DDoS) attacks
Week 7 - Security Part 2
- Attack vectors based on web application
- URL structure and how URL manipulation works
- Cross-Site Scripting (XSS) and SQL (Structured Query Language) Injection
- What encryption is and how its related to Secure Sockers Layer (SSL)/Transport Layer Security (TLS)
- Comparing the usage of cryptography in daily use of applications
- HTTP request methods and detection of status code
- Honey pot in cybersecurity
- Importance of Open Web Application Security Project (OWASP)
- Top 10 most critical risks
Week 8 - Security Part 3
- Cyber risk analysis
- Cyber security frameworks
- Blockchain and cloud computing
- Insight of darknet and how to defend yourself
- CIA and it’s usage
- Difference between threat, vulnerability and risk
- Cybersecurity frameworks and it’s efficiency in enterprise
- How blockchain technology is used in cryptocurrency
- Cloud computing and its types
- How MFA works and its types
- Dark web and how it’s used
- Protecting yourself from cyber attacks
Week 9 - Security Operation Center (SOC) Teams
- Team roles and responsibility
- Working hierarchy
- Multiple layers of Securing the infrastructure
- Physical and cloud security
- Introduction to SOC team
- Network Security
- Application Security
- Cloud Security
- Endpoint Security
- Email Security
- Vulnerability management
- Penetration Testing
- Identity Access Management (IAM)
- Security Information and Event Management (SIEM)