0% found this document useful (0 votes)
57 views6 pages

Cyber Security Training Program - V4.0

JALA Academy offers the world's first 100% job guarantee programs in IT, including a 60-day Cyber Security course designed for individuals from any background. The course covers essential topics such as network security, ethical hacking, and incident response, with hands-on labs and mentorship. Students can enroll for a one-time fee and gain access to various technologies and career support for ten years.

Uploaded by

21981a04o6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views6 pages

Cyber Security Training Program - V4.0

JALA Academy offers the world's first 100% job guarantee programs in IT, including a 60-day Cyber Security course designed for individuals from any background. The course covers essential topics such as network security, ethical hacking, and incident response, with hands-on labs and mentorship. Students can enroll for a one-time fee and gain access to various technologies and career support for ten years.

Uploaded by

21981a04o6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

JALA Academy is the world’s first Academy offering 100% Job guarantee Programs

without Trainers from 0 to 20 years’ experience.


Anyone who wants to build solid career in IT can enroll.
Read JALA Academy website and contact us for any career advice and questions.

Cyber Security
Cyber Security Project Training Guide || Duration: 45 Days
Note: Training is designed to learn everything from ZERO. Anyone with any background, skills, age,
qualification, and percentage of the marks is eligible to take this Training Program. All Training programs
are with one-on-one live online sessions until you complete the Projects.

Read our website JALA Academy for any questions or enrollment. Lowest fee in the World. You
never find the better platform anywhere else to up-skill at this price offer. You can learn any
technologies that JALA Academy is offering for 10 Years with one time fee. Invest for LIFE. Up-
skilling is a continuous process to keep your job secure for long. Become a confident Software
Engineer.

Job Guarantee Programs

Full Stack – JAVA /.Net / Python Cyber Security


QA / Selenium / API Automation / RPA Data Science / AI / ML
MERN Stack DevOps / AWS Cloud

Pre-requisite of this Course:


• Familiarity with operating systems (Windows, Linux)
• Understanding of basic networking concepts (IP addresses, DNS, routers, TCP/IP,
HTTP/HTTPS, etc.)
• Basic shell scripting for Linux (Bash commands, file permissions, user management)
• Awareness of common cyber threats such as malware, phishing, ransomware, etc.
• Firewalls, intrusion detection systems, and intrusion prevention systems
• Knowledge of regular expressions and parsing logs is a plus

_____________________________________________________________________________________
JALA Academy offers Job Guarantee Programs, Income Earning Opportunities, and Internship with
stipend on Full Stack, MERN Stack, QA, Test Automation, RPA, Cloud Technologies, DevOps and Cyber
Security. Read our website JALA Academy for more details.
JALA Academy is the world’s first Academy offering 100% Job guarantee Programs
without Trainers from 0 to 20 years’ experience.
Anyone who wants to build solid career in IT can enroll.
Read JALA Academy website and contact us for any career advice and questions.

Course Overview
This 60-day Cyber Security course is designed to equip students with the fundamental skills and
knowledge needed to identify, prevent, and mitigate cyber threats. Through a combination of
theoretical learning, practical labs, and real-world case studies, participants will explore various
aspects of cyber security, including network security, ethical hacking, incident response,
cryptography, malware analysis, and cloud security.

Course Objectives
By the end of this course, students will be able to:

• Understand Cyber Security Fundamentals: Grasp essential concepts such as network


security, firewalls, cryptography, and types of cyber threats like malware, phishing, and
ransomware.
• Secure Operating Systems and Networks: Apply security best practices to harden
Windows and Linux operating systems and secure networks using firewalls, VPNs, and
IDS/IPS.
• Implement Web Application Security: Identify and mitigate web vulnerabilities like SQL
Injection and Cross-Site Scripting (XSS), and secure web applications following the OWASP
Top 10 guidelines.
• Conduct Ethical Hacking and Penetration Testing: Perform reconnaissance, scanning,
exploitation, and post-exploitation techniques using tools like Metasploit and Burp Suite
to identify system vulnerabilities.
• Analyze and Reverse Engineer Malware: Learn static and dynamic analysis techniques
for malware investigation and reverse engineering, and apply sandboxing and memory
forensics techniques.
• Manage Cyber Incidents and Conduct Digital Forensics: Respond to security incidents
effectively and carry out digital forensics investigations to analyze breaches, gather
evidence, and trace attack origins.

_____________________________________________________________________________________
JALA Academy offers Job Guarantee Programs, Income Earning Opportunities, and Internship with
stipend on Full Stack, MERN Stack, QA, Test Automation, RPA, Cloud Technologies, DevOps and Cyber
Security. Read our website JALA Academy for more details.
JALA Academy is the world’s first Academy offering 100% Job guarantee Programs
without Trainers from 0 to 20 years’ experience.
Anyone who wants to build solid career in IT can enroll.
Read JALA Academy website and contact us for any career advice and questions.

Course Outline
Week 1: Introduction & Cyber Security Fundamentals

• Day 1: Overview of Cyber Security, Importance & Key Concepts


• Day 2: Types of Cyber Threats (Malware, Phishing, Ransomware, etc.)
• Day 3: Understanding Network Security
• Day 4: Cyber Security Terminology & Common Attack Vectors
• Day 5: Introduction to Cryptography (Hashing, Encryption)
• Day 6: Firewalls and Intrusion Detection Systems (IDS)
• Day 7: Quiz & Recap of Week 1

Week 2: Operating System Security

• Day 8: Windows Security Fundamentals


• Day 9: Linux Security Fundamentals
• Day 10: File Permissions & User Account Management (Windows/Linux)
• Day 11: Security Configuration for OS
• Day 12: Patching & Software Updates
• Day 13: System Hardening Techniques
• Day 14: Case Study: Real-World OS Vulnerabilities

Week 3: Network Security and VPNs

• Day 15: Basics of Networking (TCP/IP, DNS, HTTP)


• Day 16: Virtual Private Networks (VPNs) & How They Work
• Day 17: Secure Socket Layer (SSL) & Transport Layer Security (TLS)
• Day 18: Firewalls: Types and Implementation
• Day 19: Intrusion Detection Systems (IDS) & Prevention Systems (IPS)
• Day 20: Hands-on Lab: Setting up a VPN
• Day 21: Quiz & Recap of Week 3

_____________________________________________________________________________________
JALA Academy offers Job Guarantee Programs, Income Earning Opportunities, and Internship with
stipend on Full Stack, MERN Stack, QA, Test Automation, RPA, Cloud Technologies, DevOps and Cyber
Security. Read our website JALA Academy for more details.
JALA Academy is the world’s first Academy offering 100% Job guarantee Programs
without Trainers from 0 to 20 years’ experience.
Anyone who wants to build solid career in IT can enroll.
Read JALA Academy website and contact us for any career advice and questions.

Week 4: Web Application Security

• Day 22: Introduction to Web Security & OWASP Top 10


• Day 23: Cross-Site Scripting (XSS) Attacks and Mitigation
• Day 24: SQL Injection Attacks and Defense Mechanisms
• Day 25: Secure Authentication & Authorization (OAuth, JWT)
• Day 26: Web Application Firewalls (WAF)
• Day 27: Hands-on Lab: Detecting Vulnerabilities in Web Applications
• Day 28: Case Study: Major Web Security Breaches

Week 5: Ethical Hacking & Penetration Testing

• Day 29: Introduction to Ethical Hacking & Pen Testing Methodologies


• Day 30: Reconnaissance & Footprinting Techniques
• Day 31: Scanning Networks & Identifying Vulnerabilities
• Day 32: Exploitation Techniques: Gaining Access
• Day 33: Post-Exploitation Techniques: Maintaining Access
• Day 34: Pen Testing Tools: Metasploit, Burp Suite, etc.
• Day 35: Hands-on Lab: Pen Testing a Vulnerable Application

Week 6: Malware Analysis & Reverse Engineering

• Day 36: Introduction to Malware Analysis (Static vs Dynamic Analysis)


• Day 37: Types of Malware: Viruses, Trojans, Worms
• Day 38: Reverse Engineering Tools & Techniques
• Day 39: Introduction to Sandboxing & Memory Forensics
• Day 40: Detecting and Mitigating Malware in Windows/Linux
• Day 41: Hands-on Lab: Analyzing a Real-World Malware Sample
• Day 42: Quiz & Recap of Week 6

_____________________________________________________________________________________
JALA Academy offers Job Guarantee Programs, Income Earning Opportunities, and Internship with
stipend on Full Stack, MERN Stack, QA, Test Automation, RPA, Cloud Technologies, DevOps and Cyber
Security. Read our website JALA Academy for more details.
JALA Academy is the world’s first Academy offering 100% Job guarantee Programs
without Trainers from 0 to 20 years’ experience.
Anyone who wants to build solid career in IT can enroll.
Read JALA Academy website and contact us for any career advice and questions.

Week 7: Incident Response & Digital Forensics

• Day 43: Incident Response Lifecycle & Best Practices


• Day 44: Detecting and Handling Security Breaches
• Day 45: Forensic Investigation: Data Acquisition and Preservation
• Day 46: Memory and Disk Forensics Techniques
• Day 47: Log Analysis and Correlation Techniques
• Day 48: Hands-on Lab: Conducting a Forensic Investigation
• Day 49: Case Study: Notable Incident Response Examples

Week 8: Cloud Security & IoT Security


• Day 50: Introduction to Cloud Security Concepts (AWS, Azure, GCP)
• Day 51: Cloud Vulnerabilities and Threats
• Day 52: Securing Cloud Environments: Best Practices
• Day 53: Introduction to IoT Security: Overview & Challenges
• Day 54: Securing IoT Devices & Networks
• Day 55: Case Study: Cloud & IoT Security Incidents
• Day 56: Introduction to Big Data, Hadoop, and Spark

Week 9: Cyber Security Compliance & Frameworks


• Day 57: Overview of Cyber Security Frameworks (NIST, ISO 27001)
• Day 58: Compliance: GDPR, HIPAA, PCI DSS
• Day 59: Risk Management & Incident Reporting
• Day 60: Resume Preparation Guide

_____________________________________________________________________________________
JALA Academy offers Job Guarantee Programs, Income Earning Opportunities, and Internship with
stipend on Full Stack, MERN Stack, QA, Test Automation, RPA, Cloud Technologies, DevOps and Cyber
Security. Read our website JALA Academy for more details.
JALA Academy is the world’s first Academy offering 100% Job guarantee Programs
without Trainers from 0 to 20 years’ experience.
Anyone who wants to build solid career in IT can enroll.
Read JALA Academy website and contact us for any career advice and questions.

Rules to be followed

1. Embrace Self-Learning: The Job Guarantee Programs are designed to make you self-reliant,
with less than 20% dependency on trainers. There are plenty of high-quality, free resources
online that will help you bring out the best in yourself.
2. Follow JALA Mentors’ Guidance: Stick to the instructions provided by JALA Mentors. Avoid
content from other institutes, as it can take months or even years to complete. Focus on
hands-on learning through projects.
3. Master the Essentials: Don’t aim to learn everything. It’s enough to know how to efficiently
search, copy, and implement code from Google. Understand the concepts, practice them, and
keep repeating.
4. Learn from Multiple Mentors: Engage with at least five mentors, as no one mentor knows
everything. Learn as much as possible from each, and move on to the next level with a
different mentor.
5. Work with the Right Mentor: In Step 1, low-skilled mentors are intentionally deployed to
assist with software setup and the basics. Focus on your progress, not the mentor's skills. If a
mentor isn’t a fit, switch to another—we have dozens for each technology. Your goal is to
complete tasks and assignments, regardless of who helps.
6. Finish Projects Quickly: Complete projects as soon as possible. In Step 3, you will review
everything again when preparing for interviews.
7. Mentor to Test Your Skills: Strengthen your learning by mentoring at least five interns.
Engaging in discussions helps you learn faster and retain more.
8. Keep Mentors Updated: Regularly send status updates to all your mentors. This shows your
commitment to your tech career and ensures you get priority support for your queries.

V4.0

_____________________________________________________________________________________
JALA Academy offers Job Guarantee Programs, Income Earning Opportunities, and Internship with
stipend on Full Stack, MERN Stack, QA, Test Automation, RPA, Cloud Technologies, DevOps and Cyber
Security. Read our website JALA Academy for more details.

You might also like