This is your path to a career in Cybersecurity. In this certificate program, you’ll learn in-demand skills that can have you job-ready in less than a month. No coding or experience required.
Skills from this course: security analysis, security administration, ethical hacking, penetration testing and vulnerability management.
| Module | Session | Topics | Sub-topics | Duration (days/per day -8 hrs) |
| 1 | 8hrs x 3 | Fundamentals of Networking | Basic concepts of networking | 3 |
| Network ports, Network protocols, Types of network devices and key networking terminologies | ||||
| Basics of ping & traceroute and types of network | ||||
| Fundamental concepts of OSI model | ||||
| Network sharing and subnetting | ||||
| Fundamental concepts of network infrastructure | ||||
| Practical Exercises: Understanding router model | ||||
| Assigning IP address | ||||
| 2 | 8hrs x 1 | Network Security Techniques | Firewalls and Intrusion Detection/Prevention Systems | 1 |
| Virtual Private Networks (VPNs) and Remote Access Security | ||||
| Practical Exercises: Configuring firewall rules, setting up a VPN connection | ||||
| 3 | 8hrs x 1 | Advanced Network Security | Network Segmentation and Micro-Segmentation | 1 |
| Network Access Control (NAC) and VLAN Security | ||||
| Practical Exercises: Configuring VLANs, designing network segmentation | ||||
| 4 | 8hrs x 1 | Introduction to Advanced Network Management & Administration | Understanding Network Architecture and Protocols | 1 |
| Network Monitoring and Performance Optimization | ||||
| Practical Exercises: Wireshark packet analysis, bandwidth monitoring | ||||
| 5 | 8 hrs x 2 | Fundamental of Cyber Security | Cyber security and its importance | 2 |
| Different disciplines of cyber security | ||||
| Cyber security threats and their types | ||||
| Cyber security attacks and their applications | ||||
| Ways to use various commands | ||||
| 6 | 8 hrs x 2 | Basics of Security testing | Basics of security testing and its importance | 2 |
| Basics of vulnerability scanning | ||||
| Penetration testing and risk assessment | ||||
| Risk assessment test | ||||
| Security Audit and Posture Assessment Test | ||||
| Ethical Hacking and Network Monitoring | ||||
| Security Testing Tools | ||||
| Practical Exercises: Installing and using various tools | ||||
| Information gathering | ||||
| Perform and analyse various attacks | ||||
| 7 | 8 hrs x 2 | Advanced Application Security | Secure Software Development Lifecycle (SDLC) | 2 |
| Web Application Security and OWASP Top Ten | ||||
| Practical Exercises: Code review, identifying vulnerabilities in sample applications | ||||
| 8 | 8hrs x 2 | Cloud Security Essentials | Cloud Service Models (IaaS, PaaS, SaaS) and Deployment Models | 1 |
| Identity and Access Management (IAM) in the Cloud | ||||
| Practical Exercises: Setting up IAM policies, exploring cloud security groups | ||||
| 9 | 8hrs x 1 | Fundamentals of Access Management | Basics of Identity and Access Management & its Importance | 1 |
| Basic concepts of User Identification, Authentication and Authorization | ||||
| User Identification and Access Management Policies | ||||
| Tools used for Identity and Access Management in a public cloud platform | ||||
| Access Control Models | ||||
| Security Authorization And Encryption | ||||
| Single Sign-On and Access Management Best Practices | ||||
| Practical Exercises: Demonstrate how to perform MFA in AWS | ||||
| Demonstrate the ways to | ||||
| 10 | 8hrs x 2 | Fundamentals of Incident Management and Response | Basics of security controls | 2 |
| Security Policy and Frameworks | ||||
| Basics of Incident Management and Incident Response | ||||
| Basics of Incident Response Plan and Incident Communications Plan | ||||
| Fundamental Concepts of Incident Monitoring and Identification | ||||
| Disaster Mitigation and Containment | ||||
| Business Continuity Planning and Disaster Recovery | ||||
| Cyber Security Investigation | ||||
| Basics of a Backup and Recovery Plan | ||||
| Basic concepts of RTO (Recovery Time Objective) and RPO (Recovery Point Objective) | ||||
| Practical Exercises: Disaster recovery plan | ||||
| Describe service replication and how it can be performed | ||||
| 11 | 8hrs x 2 | Fundamentals of security operations | Basics of security forensics & its types | 2 |
| Understanding of system logging and security monitoring | ||||
| Fundamentals of Continuous Security Monitoring | ||||
| Techniques for Continuous Security Monitoring | ||||
| Basics of Data Loss Prevention and its importance | ||||
| Basic understanding of change and configuration management | ||||
| Security monitoring tools | ||||
| Practical Exercises: Installing & Configuring various tools | ||||
| Creating rules & understand security logs | ||||
| 12 | Operational Resilience Frameworks | Understanding Operational Resilience and Its Importance | 1 | |
| Developing Resilience Policies and Strategies | ||||
| 13 | Practical Implementation and Exercises | Hands-on Labs for Network Security Components | ||
| Simulated Cyber Attack Scenarios and Response Drills | ||||
After completing the cybersecurity course, I feel more confident in my ability to handle cybersecurity challenges. It's a great confidence booster for anyone entering the field.
Whether you're a beginner or have some experience in cybersecurity, this course caters to all levels. It's a great resource for those looking to deepen their understanding of the subject.
The practical focus of the course made the content immediately applicable. I appreciated that the lessons were not just theoretical but had real-world relevance. Highly recommended for anyone serious about cybersecurity.