Description
.
🔐 Cyber Security Analyst Course Curriculum
📘 Module 1: Introduction to Cybersecurity
-
What is Cybersecurity?
-
Importance of Cybersecurity in the modern world
-
Types of Cyber Attacks (Phishing, Malware, Ransomware, DDoS, etc.)
-
CIA Triad (Confidentiality, Integrity, Availability)
-
Cybersecurity career paths and roles
🌐 Module 2: Networking Fundamentals
-
OSI & TCP/IP Models
-
IP Addressing, Subnetting, DNS, DHCP
-
Network devices: routers, switches, firewalls
-
Network protocols (HTTP, HTTPS, FTP, SMTP, SSH)
-
Introduction to Wireshark & Packet Analysis
🛡️ Module 3: Network Security
-
Firewalls and their configurations
-
Intrusion Detection & Prevention Systems (IDS/IPS)
-
Virtual Private Networks (VPNs)
-
Wireless network security
-
Network monitoring tools (e.g., Nagios, SolarWinds)
🖥️ Module 4: Operating Systems & Endpoint Security
-
Windows & Linux architecture and security features
-
Hardening operating systems
-
Patch Management
-
Endpoint detection & response (EDR)
-
Antivirus, Anti-malware, and Host-based Firewalls
🧠 Module 5: Cyber Threat Intelligence
-
Types of threat actors (hacktivists, insiders, APTs)
-
Indicators of Compromise (IoC)
-
Threat feeds and threat intelligence platforms
-
MITRE ATT&CK Framework
🧰 Module 6: Tools of the Trade
-
SIEM tools: Splunk, IBM QRadar, ELK Stack
-
Vulnerability scanners: Nessus, OpenVAS
-
Packet analysis tools: Wireshark
-
Log analysis and event correlation
-
Case studies using real-world datasets
👨💻 Module 7: Ethical Hacking & Penetration Testing (Basic)
-
Reconnaissance and information gathering
-
Scanning and vulnerability assessment
-
Exploitation techniques (demo only)
-
Basics of Metasploit & Kali Linux
-
Web application security (Intro to OWASP Top 10)
🔐 Module 8: Cryptography & Data Protection
-
Introduction to cryptography (symmetric & asymmetric)
-
Hashing (SHA, MD5)
-
Digital Signatures & Certificates
-
Encryption tools and SSL/TLS protocols
🚨 Module 9: Security Operations Center (SOC) Skills
-
What is a SOC and how it works
-
SIEM Use Cases and Alerting
-
Incident Response Process
-
Ticketing Systems (e.g., ServiceNow, Jira)
-
Log sources: Windows logs, firewall logs, DNS logs
🛑 Module 10: Incident Response & Forensics
-
Incident lifecycle: detection, response, recovery
-
Memory analysis, disk forensics, and file carving
-
Chain of custody & legal considerations
-
Basic forensic tools: Autopsy, FTK Imager
⚖️ Module 11: Compliance & Governance
-
Overview of standards: ISO 27001, NIST, GDPR, HIPAA, PCI-DSS
-
Risk management basics
-
Policy creation & access control models
-
Security auditing and assessments
☁️ Module 12: Cloud & Emerging Technologies
-
Cloud Security Fundamentals (AWS, Azure, GCP)
-
Shared responsibility model
-
Common cloud threats & best practices
-
Overview of AI/ML in cybersecurity
-
IoT security basics
🧪 Final Project & Hands-on Lab
-
Simulated SOC project: analyze logs and identify threats
-
Vulnerability assessment report writing
-
Threat hunting scenario
-
Presentation of findings
🎓 Optional Certification Preparation (Add-on)
-
CompTIA Security+
-
Certified SOC Analyst (CSA)
-
EC-Council CEH (Basic Intro)
-
Microsoft SC-200 (Security Operations Analyst)
Reviews
There are no reviews yet.