🏫 Programming & Software Development

Cyber Security Fundamentals

Cybersecurity Training - SOC Analyst, Network Security & Ethical Hacking Fundamentals

Duration

12 Weeks

Weekly Hours

4 Hours

M

Course Incharge

Muzammil Bilwani

Cyber Security Fundamentals

📋 Prerequisites

Minimum Undergrad, Having PC/Laptop (at least average specifications)

📖 Course Description

Protecting sensitive data and important systems from online threats falls under the domain of CyberSecurity. Cybersecurity measures are intended to counter attacks on networks, systems, and applications, whether those threats come from within or outside of an organization. In order for users, apps, and devices to work securely, a secure infrastructure must be built and maintained. This course is intended to be the first step for a student into the World of CyberSecurity, providing the essential knowledge required to defend modern digital environments.

What You Will Learn

Understand the core principles of the CIA Triad and Security Controls

Learn Network Basics, Protocols (TCP/IP, OSI), and Wireless Security

Explore the roles of Blue and Red teams within a Security Operations Center (SOC)

Manage Risk through Business Continuity, Disaster Recovery, and Load Balancing

Implement Access Control models (MAC, DAC, RBAC) and Privileged Access

Analyze logs, Windows Event IDs, and utilize frameworks like MITRE ATT&CK

Master the fundamentals of Windows/Linux architecture and Active Directory

Course Outline

1

Introduction to CyberWorld & Career Roadmap

  • Introduction to the Course and Instructor
  • Scope and Need of Cybersecurity in the modern era
  • Job opportunities and specific roles in the Cyber World
  • Explanation of the CIA Triad (Confidentiality, Integrity, Availability)
  • Hands-on: Building a professional LinkedIn Profile for Cyber Security
2

Security Operations & Access Management

  • Defining Blue Teams vs. Red Teams
  • Introduction to SOC (Security Operations Center) and its roles
  • Privacy definitions and Security Control types
  • Authentication methods and multi-factor concepts
  • Difference between Authentication and Authorization
3

Threats, Vulnerabilities & Initial Labs

  • Deep dive into Threat vs. Vulnerability vs. Risk
  • Discussion on different types of cyber attacks (Phishing, Malware, Man-in-the-Middle)
  • Introduction to lab environments
  • Hands-on: TryHackMe introductory exercises and platform orientation
4

Risk Management & Business Continuity

  • What is Risk and professional ways to manage/mitigate risk
  • Business Continuity Planning (BCP) and Disaster Recovery (DR)
  • High Availability (HA) and Load Balancing concepts
  • Mid-month assessment: Quiz-1
5

Defense in Depth & Access Control Models

  • Explaining the 'Defense in Depth' strategy
  • Defining Separation of Duties and Least Privilege
  • Concept of Privileged Access Management (PAM)
  • Access Control Models: MAC (Mandatory), DAC (Discretionary), and RBAC (Role-Based)
  • Hands-on: Access control scenario mapping
6

Network Security & The OSI Model

  • Importance of Network Security in the modern enterprise
  • Networking fundamentals: What is a Network?
  • Understanding IP Addresses, Ports, and MAC Addresses
  • Deep dive into OSI Model vs. TCP/IP Model
  • Hands-on: Practice TryHackMe Networking modules
7

Protocols, Wireless & Secure Connectivity

  • Connection-oriented vs. Connectionless: TCP vs. UDP
  • Common Protocols: DNS, FTP, RDP, SSH, and HTTP/S
  • Wireless Network security standards
  • Defining VPNs and Proxies for secure communication
  • Hands-on: Protocol analysis and packet sniffing basics
8

Network Defense & Cloud Infrastructure

  • Network Architecture: DMZ, Segmentation, and VLANs
  • Firewall types and security policies
  • Introduction to Cloud Computing security (AWS/Azure/GCP basics)
  • Assessment: Quiz-8
9

Defensive Technologies & Global Certifications

  • Introduction to SIEM (Security Information and Event Management)
  • Understanding IDS/IPS (Intrusion Detection & Prevention)
  • Next-Gen Defense: EDR, MDR, and XDR explained
  • Roadmap to famous international certifications (CompTIA Security+, CEH, EJPT)
10

Log Analysis & Cyber Frameworks

  • Introduction to Log Analysis and importance of visibility
  • Windows Event IDs: Tracking login attempts and system changes
  • Understanding Security Frameworks: MITRE ATT&CK and Cyber Kill Chain (CKC)
  • Hands-on: Practice Log Analysis on TryHackMe
11

Operating System Architecture (Windows & Linux)

  • Basics and Fundamentals of Windows Architecture (Kernel, Registry, File System)
  • Linux Architecture fundamentals (Kernel, Shell, Root, File Permissions)
  • CLI basics for both Windows (PowerShell/CMD) and Linux (Bash)
  • Hands-on: Navigating and securing OS environments via Command Line
12

Active Directory & Enterprise Identity

  • Introduction to Active Directory (AD) and its importance in corporations
  • Essential AD concepts: Domain Controllers, Users, Groups, and OUs
  • Group Policy Objects (GPO) basics
  • Final Course Review and career counseling session

📊 Grading Criteria

ComponentPercentage
Quizzes20%
Class Participation / Attendance15%
Projects25%
Final Projects40%
Total100%

Ready to Register in This Course?

Join thousands of students who have transformed their careers. Start your journey today!