Course Content
Module 1: Cybersecurity Foundations
You don't currently have access to this content
6 Topics
1 Quiz
Introduction to Cybersecurity
You don't currently have access to this content
CIA Triad (Confidentiality, Integrity, Availability)
You don't currently have access to this content
Types of Threat Actors (Hacktivists, Nation-States, Script Kiddies)
You don't currently have access to this content
Cyber Risk (Threats and Vulnerabilities)
You don't currently have access to this content
Cybersecurity Career Paths
You don't currently have access to this content
Top 10 Cybersecurity Certifications
You don't currently have access to this content
Quiz 1: Module 1 – Cybersecurity Foundations
You don't currently have access to this content
Module 2: Threat Landscape
You don't currently have access to this content
4 Topics
1 Quiz
Cyber Threats and Mitigations
You don't currently have access to this content
Malware Types (Viruses, Worms, Ransomware)
You don't currently have access to this content
Social Engineering (Phishing, Pretexting, Baiting)
You don't currently have access to this content
Case Studies: Notable Breaches (Equifax, SolarWinds)
You don't currently have access to this content
Quiz 2: Module 2 – Threat Landscape
You don't currently have access to this content
Module 3: Network Security
You don't currently have access to this content
5 Topics
1 Quiz
OSI Model and Security
You don't currently have access to this content
Firewalls and Types
You don't currently have access to this content
IDS/IPS Systems
You don't currently have access to this content
Layer 3 Security, ACLs
You don't currently have access to this content
Layer 2 Security, Port Security
You don't currently have access to this content
Quiz 3: Module 3 – Network Security
You don't currently have access to this content
Module 4: Cryptography Basics
You don't currently have access to this content
5 Topics
1 Quiz
What is Cryptography
You don't currently have access to this content
Steganography
You don't currently have access to this content
Symmetric vs. Asymmetric Encryption
You don't currently have access to this content
Layer 4 Security, SSL/TLS
You don't currently have access to this content
VPNs, and Hashing (SHA/MD5)
You don't currently have access to this content
Quiz 4: Module 4 – Cryptography Basics
You don't currently have access to this content
Module 5: Ethical Hacking Fundamentals
You don't currently have access to this content
4 Topics
1 Quiz
White, Grey and Black Hat
You don't currently have access to this content
Kali Linux Tools (Nmap, Metasploit)
You don't currently have access to this content
Vulnerability Scanning with Nessus/OpenVAS
You don't currently have access to this content
CTF Challenge: Basic Penetration Test
You don't currently have access to this content
Quiz 5: Module 5 – Ethical Hacking Fundamentals
You don't currently have access to this content
Module 6: Defense Strategies
You don't currently have access to this content
7 Topics
1 Quiz
Layered Security
You don't currently have access to this content
Zero Trust Model
You don't currently have access to this content
SIEM Systems (Splunk, AlienVault)
You don't currently have access to this content
Security Operations Centre (SOC)
You don't currently have access to this content
Incident Response Management
You don't currently have access to this content
BCP Concepts
You don't currently have access to this content
DRP Concepts
You don't currently have access to this content
Quiz 6: Module 6 – Defense Strategies
You don't currently have access to this content
Module 7: Compliance & Laws
You don't currently have access to this content
5 Topics
1 Quiz
IT Management vs Governance
You don't currently have access to this content
COBIT 2019 Overview
You don't currently have access to this content
ISO 27001 Overview
You don't currently have access to this content
GDPR, HIPAA, PCI-DSS Overview
You don't currently have access to this content
Risk Assessment Frameworks (NIST CSF)
You don't currently have access to this content
Quiz 7: Module 7 – Compliance & Laws
You don't currently have access to this content
Module 8: Emerging Trends
You don't currently have access to this content
3 Topics
1 Quiz
Cloud Security (AWS/Azure)
You don't currently have access to this content
IoT Vulnerabilities
You don't currently have access to this content
AI in Cybersecurity
You don't currently have access to this content
Quiz 8: Module 8 – Emerging Trends
You don't currently have access to this content

