Introduction to Cyber Security
Understanding Cyber Security
- What is Cyber Security?
- Importance of Cyber Security in IT and Business
- Key Cyber Security Domains (Network, Application, Cloud, Data Security)
Common Cyber Threats & Attacks
- Malware, Ransomware, Phishing, DoS & DDoS Attacks
- Social Engineering Attacks & Insider Threats
- Recent Cyber Attacks & Case Studies
Cyber Security Frameworks & Standards
- NIST, ISO 27001, CIS Controls
- GDPR, HIPAA, PCI-DSS Compliance
- Understanding Risk Management & Governance
Networking & Security Fundamentals
Basics of Computer Networks
- OSI & TCP/IP Model
- Network Protocols (HTTP, HTTPS, FTP, DNS, SMTP, SNMP)
- IP Addressing, Subnetting & VLANs
Network Security Concepts
- Firewalls, IDS, IPS, and VPNs
- Network Segmentation & Zero Trust Architecture
- Secure Network Design & Best Practices
Wireless & Cloud Security
- WPA2, WPA3, and Wireless Hacking Techniques
- Cloud Security Principles & Shared Responsibility Model
- Cloud Security Tools & Configurations (AWS, Azure, GCP)
System Security & Endpoint Protection
Operating System Security
- Hardening Windows & Linux Systems
- Patch Management & Secure Configuration
- Secure Shell (SSH) & Remote Access Best Practices
Endpoint Security & Antivirus Solutions
- Next-Generation Antivirus (NGAV) & EDR Solutions
- Sandboxing & Endpoint Detection Techniques
- Secure Authentication & Multi-Factor Authentication (MFA)
Privilege Access Management (PAM)
- Implementing Role-Based Access Control (RBAC)
- Managing Privileged Accounts & Least Privilege Principle
- Securing Administrator Accounts
Ethical Hacking & Penetration Testing
Introduction to Ethical Hacking
- Understanding Penetration Testing Methodologies
- Red Team vs. Blue Team vs. Purple Team
- Cyber Kill Chain & MITRE ATT&CK Framework
Reconnaissance & Information Gathering
- Passive & Active Reconnaissance
- Using OSINT Tools (Shodan, Maltego, TheHarvester)
- Social Engineering Techniques & Defense
Exploitation & Vulnerability Assessment
- Web Application Security Testing (OWASP Top 10)
- Network & Wireless Hacking Techniques
- Exploiting Vulnerabilities using Metasploit
Secure Software Development (DevSecOps)
Introduction to Secure Coding
- Secure SDLC & DevSecOps Principles
- Common Software Vulnerabilities (SQL Injection, XSS, CSRF)
- Secure Coding Practices for Python, Java, and .NET
Static & Dynamic Application Security Testing (SAST & DAST)
- Using SAST Tools (SonarQube, Checkmarx)
- DAST Tools & Automated Penetration Testing
Container & API Security
- Securing Docker & Kubernetes Environments
- API Security Best Practices & OWASP API Security Top 10
- Implementing Security in CI/CD Pipelines
Digital Forensics & Incident Response (DFIR)
Incident Detection & Response Frameworks
- Cyber Incident Response Lifecycle (NIST & SANS)
- Logging & Monitoring Best Practices
- Security Information and Event Management (SIEM) Tools
Digital Forensics & Evidence Collection
- Memory & Disk Forensics (Autopsy, FTK, EnCase)
- Log Analysis & Threat Hunting Techniques
- Chain of Custody & Legal Considerations in Forensics
Malware Analysis & Reverse Engineering
- Static vs. Dynamic Malware Analysis
- Dissecting Malicious Code with IDA Pro & OllyDbg
- Behavioral Analysis in a Sandbox Environment
Cloud Security & Compliance
Cloud Security Best Practices
- AWS, Azure, and Google Cloud Security Models
- Identity & Access Management (IAM) in Cloud
- Cloud Logging & Monitoring (CloudTrail, Security Command Center)
Cloud Security Misconfigurations & Attacks
- Insecure APIs & Data Exposure
- Cloud Misconfiguration Exploits & Data Breaches
- Protecting Against Serverless Attacks
Compliance & Governance in Cloud Security
- Implementing GDPR, CCPA, and HIPAA Controls
- Cloud Risk Assessment & Compliance Audits
- Cloud Security Posture Management (CSPM)
Threat Intelligence & SOC Operations
Understanding Cyber Threat Intelligence (CTI)
- Strategic, Tactical, and Operational Threat Intelligence
- Threat Intelligence Platforms & Feeds (MISP, VirusTotal, AlienVault)
Security Operations Center (SOC) & SIEM
- SOC Roles & Responsibilities
- SIEM Deployment (Splunk, QRadar, ELK Stack)
- Log Correlation & Threat Hunting
MITRE ATT&CK & Threat Hunting
- Threat Hunting Methodologies & Tools
- Using YARA Rules & Sigma Rules for Detection
- Analyzing Attack Patterns & Creating Threat Reports
Identity & Access Management (IAM)
Introduction to IAM & Zero Trust
- Understanding Identity Governance & Administration
- Implementing Zero Trust Security Model
Multi-Factor Authentication & SSO
- Implementing MFA with Google Authenticator, YubiKey
- Configuring SAML & OAuth for Secure Authentication
Privileged Identity Management (PIM)
- Controlling & Monitoring Privileged User Access
- Managing Just-In-Time (JIT) Access
Security Auditing & Risk Management
Introduction to Risk Management
- Identifying, Assessing, and Mitigating Cyber Risks
- Business Continuity & Disaster Recovery (BCDR)
Security Auditing & Compliance
- Conducting Security Audits & Assessments
- Preparing for External & Internal Audits
Cyber Security Policies & Best Practices
- Writing Security Policies & Procedures
- Implementing a Security Awareness Program