This is your path to a career in Cybersecurity. In this certificate program, you’ll learn in-demand skills that can have you job-ready in less than a month. No coding or experience required.
Skills from this course: security analysis, security administration, ethical hacking, penetration testing and vulnerability management.
Module | Session | Topics | Sub-topics | Duration (days/per day -8 hrs) |
1 | 8hrs x 3 | Fundamentals of Networking | Basic concepts of networking | 3 |
Network ports, Network protocols, Types of network devices and key networking terminologies | ||||
Basics of ping & traceroute and types of network | ||||
Fundamental concepts of OSI model | ||||
Network sharing and subnetting | ||||
Fundamental concepts of network infrastructure | ||||
Practical Exercises: Understanding router model | ||||
Assigning IP address | ||||
2 | 8hrs x 1 | Network Security Techniques | Firewalls and Intrusion Detection/Prevention Systems | 1 |
Virtual Private Networks (VPNs) and Remote Access Security | ||||
Practical Exercises: Configuring firewall rules, setting up a VPN connection | ||||
3 | 8hrs x 1 | Advanced Network Security | Network Segmentation and Micro-Segmentation | 1 |
Network Access Control (NAC) and VLAN Security | ||||
Practical Exercises: Configuring VLANs, designing network segmentation | ||||
4 | 8hrs x 1 | Introduction to Advanced Network Management & Administration | Understanding Network Architecture and Protocols | 1 |
Network Monitoring and Performance Optimization | ||||
Practical Exercises: Wireshark packet analysis, bandwidth monitoring | ||||
5 | 8 hrs x 2 | Fundamental of Cyber Security | Cyber security and its importance | 2 |
Different disciplines of cyber security | ||||
Cyber security threats and their types | ||||
Cyber security attacks and their applications | ||||
Ways to use various commands | ||||
6 | 8 hrs x 2 | Basics of Security testing | Basics of security testing and its importance | 2 |
Basics of vulnerability scanning | ||||
Penetration testing and risk assessment | ||||
Risk assessment test | ||||
Security Audit and Posture Assessment Test | ||||
Ethical Hacking and Network Monitoring | ||||
Security Testing Tools | ||||
Practical Exercises: Installing and using various tools | ||||
Information gathering | ||||
Perform and analyse various attacks | ||||
7 | 8 hrs x 2 | Advanced Application Security | Secure Software Development Lifecycle (SDLC) | 2 |
Web Application Security and OWASP Top Ten | ||||
Practical Exercises: Code review, identifying vulnerabilities in sample applications | ||||
8 | 8hrs x 2 | Cloud Security Essentials | Cloud Service Models (IaaS, PaaS, SaaS) and Deployment Models | 1 |
Identity and Access Management (IAM) in the Cloud | ||||
Practical Exercises: Setting up IAM policies, exploring cloud security groups | ||||
9 | 8hrs x 1 | Fundamentals of Access Management | Basics of Identity and Access Management & its Importance | 1 |
Basic concepts of User Identification, Authentication and Authorization | ||||
User Identification and Access Management Policies | ||||
Tools used for Identity and Access Management in a public cloud platform | ||||
Access Control Models | ||||
Security Authorization And Encryption | ||||
Single Sign-On and Access Management Best Practices | ||||
Practical Exercises: Demonstrate how to perform MFA in AWS | ||||
Demonstrate the ways to | ||||
10 | 8hrs x 2 | Fundamentals of Incident Management and Response | Basics of security controls | 2 |
Security Policy and Frameworks | ||||
Basics of Incident Management and Incident Response | ||||
Basics of Incident Response Plan and Incident Communications Plan | ||||
Fundamental Concepts of Incident Monitoring and Identification | ||||
Disaster Mitigation and Containment | ||||
Business Continuity Planning and Disaster Recovery | ||||
Cyber Security Investigation | ||||
Basics of a Backup and Recovery Plan | ||||
Basic concepts of RTO (Recovery Time Objective) and RPO (Recovery Point Objective) | ||||
Practical Exercises: Disaster recovery plan | ||||
Describe service replication and how it can be performed | ||||
11 | 8hrs x 2 | Fundamentals of security operations | Basics of security forensics & its types | 2 |
Understanding of system logging and security monitoring | ||||
Fundamentals of Continuous Security Monitoring | ||||
Techniques for Continuous Security Monitoring | ||||
Basics of Data Loss Prevention and its importance | ||||
Basic understanding of change and configuration management | ||||
Security monitoring tools | ||||
Practical Exercises: Installing & Configuring various tools | ||||
Creating rules & understand security logs | ||||
12 | Operational Resilience Frameworks | Understanding Operational Resilience and Its Importance | 1 | |
Developing Resilience Policies and Strategies | ||||
13 | Practical Implementation and Exercises | Hands-on Labs for Network Security Components | ||
Simulated Cyber Attack Scenarios and Response Drills | ||||
After completing the cybersecurity course, I feel more confident in my ability to handle cybersecurity challenges. It's a great confidence booster for anyone entering the field.
Whether you're a beginner or have some experience in cybersecurity, this course caters to all levels. It's a great resource for those looking to deepen their understanding of the subject.
The practical focus of the course made the content immediately applicable. I appreciated that the lessons were not just theoretical but had real-world relevance. Highly recommended for anyone serious about cybersecurity.