-
Module 1: General Security Concepts
6 Lessons-
StartCore Security Principles (CIA Triad: Confidentiality, Integrity, Availability)
-
StartSecurity Controls & Best Practices (Preventative, Detective, Corrective)
-
StartAuthentication, Authorization, and Accounting (AAA)
-
StartNon-Repudiation & Identity Verification
-
StartSecurity Awareness and Training
-
StartHands-on Labs: Identifying and implementing basic security controls
-
-
Module 2: Threats, Vulnerabilities, and Mitigations
7 Lessons-
StartThreat Actors & Attack Vectors (Hacktivists, Nation-States, Insider Threats)
-
StartMalware Types & Infection Methods (Viruses, Ransomware, Trojans)
-
StartSocial Engineering Techniques (Phishing, Impersonation, Tailgating)
-
StartApplication Security Risks G Exploits (SǪL Injection, XSS, Zero-Day Attacks)
-
StartCommon Network Attacks (Man-in-the-Middle, DDoS, ARP Spoofing)
-
StartVulnerability Management (Scanning, Patching, CVE Identification)
-
StartHands-on Labs: Conducting a vulnerability assessment, Simulating live attacks on virtual machines
-
-
Module 3: Security Architecture
6 Lessons-
StartNetwork Security Design (Segmentation, DMZ, Zero Trust)
-
StartSecure Cloud & Virtualization Concepts (IaaS, PaaS, SaaS Security)
-
StartEndpoint & Device Security (IoT, Mobile, BYOD Policies)
-
StartData Protection Strategies (Encryption, Masking, Tokenization)
-
StartApplication Security Controls (Secure Coding Practices, Hardening Systems)
-
StartHands-on Labs: Configuring network security with firewalls and VLANs , Configuring access list security configuration
-
-
Module 4: Security Operations
6 Lessons-
StartSecurity & Vulnerability Management (Patching, Log Analysis)
-
StartSecurity Monitoring Tools & SIEM (Security Information G Event Management)
-
StartIncident Response Lifecycle (Preparation, Detection, Containment, Eradication, Recovery)
-
StartDigital Forensics Fundamentals (Evidence Collection, Chain of Custody)
-
StartSecurity Automation & Threat Intelligence
-
StartHands-on Labs: Analyzing security logs using SIEM tools, Conducting a live scanning and attacks
-
-
Module 5: Security Program Management G Compliance
6 Lessons-
StartGovernance & Security Frameworks (ISO 27001, NIST, CIS Controls)
-
StartRisk Management & Business Continuity (BCP G DRP)
-
StartRegulatory Compliance & Legal Considerations (GDPR, HIPAA, PCI-DSS)
-
StartSecurity Audits & Assessment Techniques
-
StartSecurity Awareness Training G Policies
-
StartHands-on Labs: Conducting a security risk assessment, Developing a basic security policy document
-
