0% found this document useful (0 votes)
281 views3 pages

Cybersecurity Course Syllabus

Uploaded by

gearsquantum
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
281 views3 pages

Cybersecurity Course Syllabus

Uploaded by

gearsquantum
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Cybersecurity Fundamentals Course

Syllabus
Module 1: Introduction to Cybersecurity

- Cybersecurity Threats and Vulnerabilities


- Basic Terminologies: Threat, Vulnerability, Risk, and Attack

Module 2: Operating Systems and Network Security


- Operating Systems: Windows and Linux Fundamentals
- Networking Concepts: TCP/IP Protocols, Firewalls, and VPNs
- Network Security: Firewalls, IDS/IPS, and SIEM Systems
- Wireless Security: WLAN Security Protocols and WPA

Module 3: System and Application Security


- System Hardening Techniques: Patching and Updates
- Application Security: Secure Coding and Testing
- Vulnerability Management: Common Vulnerabilities (OWASP Top 10)
- Cyber Resilience: Planning and Recovery

Module 4: Ethical Hacking and Penetration Testing


- Introduction to Ethical Hacking
- Phases of Hacking: Reconnaissance, Scanning, Exploitation, Post-Exploitation
- Vulnerability Assessment and Penetration Testing (VAPT)
- Tools: Nmap, Metasploit, Wireshark, Burp Suite

Learning Outcome:
- Gain proficiency in ethical hacking methodologies and tools.
- Perform vulnerability assessments and penetration testing.
Module 5: Incident Response and Threat Intelligence
- Incident Response: Detection, Analysis, and Recovery
- Threat Intelligence: Gathering, Analyzing, and Reporting Threat Data
- Malware Analysis and Defense Strategies
- Mitigating Ransomware and Phishing Attacks

Learning Outcome:
- Learn how to handle cybersecurity incidents.
- Understand how to use threat intelligence to enhance security posture.

Module 6: Cloud and Application Security


- Securing Cloud Infrastructure (Azure, AWS)
- Identity and Access Management (IAM)
- Securing Web Applications: OWASP Practices
- Secure Application Development (DevSecOps)

Learning Outcome:
- Understand cloud security fundamentals and practices.
- Learn about securing web applications and managing access control.

Module 7: Compliance and Cyber Laws


- Overview of Cybersecurity Laws and Regulations (GDPR, HIPAA, ISO/IEC 27001)
- Compliance Management
- Cyber Ethics: Privacy, Intellectual Property, and Legal Implications

Learning Outcome:
- Learn about global and regional cybersecurity regulations.
- Understand the legal aspects of cybersecurity and ethical responsibilities.

Module 8: Advanced Topics and Capstone Project


- Advanced Malware and Ransomware Defense
- Security Operations Center (SOC) Operations
- Red Team vs. Blue Team Exercises
- Cybersecurity Capstone Project

Learning Outcome:
- Apply knowledge in a real-world simulation through a capstone project.
- Gain hands-on experience in defending against and responding to complex threats.
Electives:
1. Generative AI in Cybersecurity
- Role of AI in Threat Detection and Prevention
- Deepfake Detection and NLP Techniques

2. Microsoft Certified: Azure Security Engineer Associate


- Advanced Security in Azure Environments

You might also like