Cyber Security Fundamentals
Cybersecurity Training - SOC Analyst, Network Security & Ethical Hacking Fundamentals
12 Weeks
4 Hours
Course Incharge
Muzammil Bilwani

📋 Prerequisites
✓ Minimum Undergrad, Having PC/Laptop (at least average specifications)
📖 Course Description
Protecting sensitive data and important systems from online threats falls under the domain of CyberSecurity. Cybersecurity measures are intended to counter attacks on networks, systems, and applications, whether those threats come from within or outside of an organization. In order for users, apps, and devices to work securely, a secure infrastructure must be built and maintained. This course is intended to be the first step for a student into the World of CyberSecurity, providing the essential knowledge required to defend modern digital environments.
What You Will Learn
Understand the core principles of the CIA Triad and Security Controls
Learn Network Basics, Protocols (TCP/IP, OSI), and Wireless Security
Explore the roles of Blue and Red teams within a Security Operations Center (SOC)
Manage Risk through Business Continuity, Disaster Recovery, and Load Balancing
Implement Access Control models (MAC, DAC, RBAC) and Privileged Access
Analyze logs, Windows Event IDs, and utilize frameworks like MITRE ATT&CK
Master the fundamentals of Windows/Linux architecture and Active Directory
Course Outline
Introduction to CyberWorld & Career Roadmap
- →Introduction to the Course and Instructor
- →Scope and Need of Cybersecurity in the modern era
- →Job opportunities and specific roles in the Cyber World
- →Explanation of the CIA Triad (Confidentiality, Integrity, Availability)
- →Hands-on: Building a professional LinkedIn Profile for Cyber Security
Security Operations & Access Management
- →Defining Blue Teams vs. Red Teams
- →Introduction to SOC (Security Operations Center) and its roles
- →Privacy definitions and Security Control types
- →Authentication methods and multi-factor concepts
- →Difference between Authentication and Authorization
Threats, Vulnerabilities & Initial Labs
- →Deep dive into Threat vs. Vulnerability vs. Risk
- →Discussion on different types of cyber attacks (Phishing, Malware, Man-in-the-Middle)
- →Introduction to lab environments
- →Hands-on: TryHackMe introductory exercises and platform orientation
Risk Management & Business Continuity
- →What is Risk and professional ways to manage/mitigate risk
- →Business Continuity Planning (BCP) and Disaster Recovery (DR)
- →High Availability (HA) and Load Balancing concepts
- →Mid-month assessment: Quiz-1
Defense in Depth & Access Control Models
- →Explaining the 'Defense in Depth' strategy
- →Defining Separation of Duties and Least Privilege
- →Concept of Privileged Access Management (PAM)
- →Access Control Models: MAC (Mandatory), DAC (Discretionary), and RBAC (Role-Based)
- →Hands-on: Access control scenario mapping
Network Security & The OSI Model
- →Importance of Network Security in the modern enterprise
- →Networking fundamentals: What is a Network?
- →Understanding IP Addresses, Ports, and MAC Addresses
- →Deep dive into OSI Model vs. TCP/IP Model
- →Hands-on: Practice TryHackMe Networking modules
Protocols, Wireless & Secure Connectivity
- →Connection-oriented vs. Connectionless: TCP vs. UDP
- →Common Protocols: DNS, FTP, RDP, SSH, and HTTP/S
- →Wireless Network security standards
- →Defining VPNs and Proxies for secure communication
- →Hands-on: Protocol analysis and packet sniffing basics
Network Defense & Cloud Infrastructure
- →Network Architecture: DMZ, Segmentation, and VLANs
- →Firewall types and security policies
- →Introduction to Cloud Computing security (AWS/Azure/GCP basics)
- →Assessment: Quiz-8
Defensive Technologies & Global Certifications
- →Introduction to SIEM (Security Information and Event Management)
- →Understanding IDS/IPS (Intrusion Detection & Prevention)
- →Next-Gen Defense: EDR, MDR, and XDR explained
- →Roadmap to famous international certifications (CompTIA Security+, CEH, EJPT)
Log Analysis & Cyber Frameworks
- →Introduction to Log Analysis and importance of visibility
- →Windows Event IDs: Tracking login attempts and system changes
- →Understanding Security Frameworks: MITRE ATT&CK and Cyber Kill Chain (CKC)
- →Hands-on: Practice Log Analysis on TryHackMe
Operating System Architecture (Windows & Linux)
- →Basics and Fundamentals of Windows Architecture (Kernel, Registry, File System)
- →Linux Architecture fundamentals (Kernel, Shell, Root, File Permissions)
- →CLI basics for both Windows (PowerShell/CMD) and Linux (Bash)
- →Hands-on: Navigating and securing OS environments via Command Line
Active Directory & Enterprise Identity
- →Introduction to Active Directory (AD) and its importance in corporations
- →Essential AD concepts: Domain Controllers, Users, Groups, and OUs
- →Group Policy Objects (GPO) basics
- →Final Course Review and career counseling session
📊 Grading Criteria
| Component | Percentage |
|---|---|
| Quizzes | 20% |
| Class Participation / Attendance | 15% |
| Projects | 25% |
| Final Projects | 40% |
| Total | 100% |
Ready to Register in This Course?
Join thousands of students who have transformed their careers. Start your journey today!