Curriculum
- 30 Sections
- 325 Lessons
- 17 Weeks
Expand all sectionsCollapse all sections
- ZOOM MEETING LINK1
- GENERAL COURSE INTRODUCTION1
- MODULE 1: INTRODUCTION TO CYBER SECURITY15
- 3.1Notes
- 3.2Video
- 3.3Cybersecurity Principles and Objectives
- 3.4The CIA Triad (Confidentiality, Integrity, Availability)
- 3.5Core Cybersecurity Principles
- 3.6The Castle-and-Moat Security Model (Traditional Perimeter Security)
- 3.7Zero Trust Framework (Modern Security Approach)
- 3.8Perimeter Security vs. Zero Trust: A Comparative Analysis
- 3.9Cybersecurity Frameworks and Standards
- 3.10Compliance Frameworks and Regulations
- 3.11Security Tools and Technologies
- 3.12Job Market Outlook
- 3.13Interview Questions
- 3.14ZeroTrust Lab:
- 3.15Hands-On Lab:
- MODULE 2: NETWORKING AND SECURITY FUNDAMENTAL20
- 4.1Notes
- 4.2Video
- 4.3Notes 2
- 4.4Definition of Computer Networks
- 4.5Importance of Computer Networking
- 4.6Early History of Computer Networking
- 4.7The Internet and Its Growth
- 4.8The OSI Model (Open Systems Interconnection Model)
- 4.9Data Flow Through the OSI Model
- 4.10Tools for Network Troubleshooting
- 4.11Data Encapsulation and Decapsulation
- 4.12TCP Three-Way Handshake
- 4.13Network Topologies and Network Ports
- 4.14Network Structures & Types
- 4.15Public vs. Private Networks
- 4.16IPv4 Subnetting Basics
- 4.17IT Protocols and Network Communication
- 4.18Domain Name System (DNS)
- 4.19Hands-On Lab: Network and Traffic Monitoring
- 4.20Resume and interview questions
- MODULE 3: CLOUD COMPUTING AND AWS14
- 5.1Notes
- 5.2Videos
- 5.3Introduction to Cloud Computing
- 5.4History and Evolution of Cloud Computing
- 5.5Benefits of Cloud Computing:
- 5.6Types of Cloud Services
- 5.7Deployment Models
- 5.8Transition to AWS: Why AWS for Cloud Computing?
- 5.9Overview of Amazon Web Services (AWS)
- 5.10AWS Regions and Availability Zones
- 5.11AWS Use Cases
- 5.12Getting Started with AWS
- 5.13Challenges and Considerations
- 5.14Hands-On Lab: AWS Setup
- MODULE 4: INTRODUCTION TO AWS IAM14
- 6.1Notes
- 6.2Videos
- 6.3Introduction to IAM
- 6.4IAM Users
- 6.5IAM Groups
- 6.6IAM Roles
- 6.7IAM Policies
- 6.8IAM Security Best Practices
- 6.9IAM and Federation
- 6.10Advanced IAM Concepts
- 6.11IAM Troubleshooting and Management
- 6.12IAM and the CISA Zero Trust Maturity Model
- 6.13Integration with External Identity Providers
- 6.14Lab/Projects
- FRAMEWORK AND CLOUD SECURITY MAPPING RELATED TO IAM1
- MODULE 5: CLOUD AND NETWORK SECURITY11
- MODULE 6: COMPUTE SERVICES13
- 9.1Notes
- 9.2Videos
- 9.3Introduction to Amazon EC2
- 9.4Virtualization and EC2 Instances
- 9.5EC2 Instance Types and Use Cases
- 9.6Amazon Machine Image (AMI)
- 9.7Instance Storage
- 9.8EC2 Security
- 9.9EC2 Instance Management
- 9.10EC2 Cost Optimization
- 9.11Networking & Security in EC2
- 9.12Auto Scaling and Load Balancing
- 9.13Lab
- MODULE 7: CLOUD AND DATA STORAGE SECURITY16
- 10.1Videos
- 10.2Notes
- 10.3Introduction to Cloud Data Storage
- 10.4Introduction to AWS Cloud Data Storage
- 10.5Cloud Storage Models
- 10.6Cloud Storage Architecture
- 10.7Introduction to AWS Cloud Data Storage
- 10.8AWS Storage Services Overview
- 10.9Amazon S3: Object Storage in Depth
- 10.10Amazon EBS: Block Storage for EC2
- 10.11Amazon EFS: File Storage for Cloud Applications
- 10.12Data Management and Cost Optimization
- 10.13AWS Storage Security
- 10.14AWS Backup and Disaster Recovery
- 10.15Monitoring and Performance Optimization
- 10.16Lab
- MODULE 8: APPLICATION SECURITY9
- 11.1APPLICATION SECURITY
- 11.2AWS WAF (Web Application Firewall)
- 11.3Amazon API Gateway with AWS Shield for API Security
- 11.4DATA SECURITY
- 11.5Amazon Macie for Data Discovery and Classification
- 11.6AWS KMS and S3 Encryption for Data at Rest
- 11.7AWS Certificate Manager for Data in Transit
- 11.8Amazon RDS, Redshift, and DynamoDB Security
- 11.9AWS Backup and Amazon S3 Versioning for Data Resiliency
- MODULE 9: LINUX ADMINISTRATION10
- MODULE 10: INCIDENT RESPONSE AND DISASTER RECOVERY (AWS)8
- 13.1Introduction to Data Loss Prevention (DLP) in AWS
- 13.2AWS Macie for Data Discovery and Classification
- 13.3DLP Best Practices in AWS
- 13.4Disaster Recovery Approaches in AWS
- 13.5Implementing Disaster Recovery in AWS
- 13.6Best Practices for AWS Disaster Recovery
- 13.7Hands-on Lab: Setting up DLP and DR in AWS
- 13.8Case Studies and Real-world Applications
- MODULE 11: CLOUD MIGRATION AND SECURITY8
- MODULE 12: CONTAINERIZATION AND SECURITY5
- MODULE 13: CYBER THREATS, VULNERABILITIES, AND ATTACK TECHNIQUES17
- 16.1Notes
- 16.2Videos
- 16.3Introduction to Cybersecurity Threats
- 16.4Common Types of Cyber Threats
- 16.5Social Engineering Attacks
- 16.6Vulnerabilities Management
- 16.7Attack Techniques
- 16.8Network-Based Attacks
- 16.9Advanced Persistent Threats (APTs)
- 16.10Emerging Threats and Attack Vectors
- 16.11Best Practices for Threat Prevention
- 16.12Introduction to general cryptography
- 16.13Anatomy of Malicious Email
- 16.14Hands on Lab: Analyzing Suspicious Emails and Malicious IPs: The Role of a SOC Analyst
- 16.15SOC WorkFlow
- 16.16Hands On Lab – Vulnerablity Management Automation
- 16.17Resume and Interview Questions
- MODULE 14: DEEP VULNERABLITY MANAGEMENT17
- 17.1Notes
- 17.2Video
- 17.3Introduction to Vulnerability Management
- 17.4Importance of Vulnerability Management in Cybersecurity
- 17.5Benefits of Vulnerability Management
- 17.6Vulnerability Lifecycle
- 17.7Common Vulnerability Types
- 17.8Vulnerability Management Frameworks
- 17.9Tools for Vulnerability Management
- 17.10How the NVD Works
- 17.11Understanding CVSS (Common Vulnerability Scoring System)
- 17.12Network Vulnerability Management
- 17.13Application Vulnerability Management
- 17.14Database Vulnerability Management
- 17.15Cloud Vulnerability Management
- 17.16Container Vulnerability Management
- 17.17Labs and Hands
- MODULE 15: CYBERSECURITY AND AUTOMATION15
- 18.1Notes
- 18.2Videos
- 18.3Introduction to Cybersecurity
- 18.4Security Operations Center (SOC)
- 18.5Cybersecurity Automation
- 18.6SIEM Tools Overview
- 18.7Introduction to Splunk
- 18.8Splunk for Security Use Cases
- 18.9Splunk SOAR (Security Orchestration, Automation, and Response)
- 18.10Splunk Apps for Security
- 18.11Advanced Topics and Future Trends
- 18.12Splunk Enterprise Installation via command line
- 18.13Splunk Forwarders Installation via command line
- 18.14Splunk Indexers Installation via command line
- 18.15Hands-on Labs and Exercises
- MODULE 16: CYBER SECURITY AND ZERO TRUST FRAMEWORK12
- 19.1Notes
- 19.2Videos
- 19.3NIST Cybersecurity Framework (CSF)
- 19.4Zero Trust Architecture (ZTA)
- 19.5Mapping AWS Cloud Native Toos with Zero Trust
- 19.6Zero Trust Maturity Model
- 19.7Implementing Zero Trust
- 19.8Aligning Frameworks with Zero Trust
- 19.9Emerging Trends in Cybersecurity Frameworks
- 19.10Zero Trust Deployment Strategy
- 19.11Hands-On Exercises
- 19.12Resume and Interview Questions
- MODULE 17: IDENTITY AND ACCESS MANAMGENT18
- 20.1Notes
- 20.2Videos
- 20.3Introduction to Identity and Access Management (IAM)
- 20.4History of IAM Technology
- 20.5Authentication Before IAM Technology
- 20.6Overview of Microsoft Active Directory
- 20.7Identities in Cybersecurity
- 20.8Leading Identity Providers
- 20.9How Identity Management Works Behind the Scenes
- 20.10Identity Providers and Access Management Solutions
- 20.11Diffferences between identity and Access Management Providers
- 20.12Main Forms of Identity and Multifactor Solutions
- 20.13Concepts Behind Single Sign-On (SSO) Technology
- 20.14User Lifecycle Management 45.5%
- 20.15Security and Policy Framework 16%
- 20.16Application Integration
- 20.17Universal Directory and Profile Management
- 20.18Sample Job Related Resume
- MODULE 18: PRIVILEGED ACCESS MANAGEMENT (PAM)13
- 21.1Notes
- 21.2Videos
- 21.3Introduction to Privileged Access Management (PAM)
- 21.4Core Components of a PAM Solution
- 21.5Key Features of an Effective PAM Solution
- 21.6Deployment of a PAM Solution
- 21.7Common PAM Use Cases
- 21.8Most Popular PAM Solutions
- 21.9Integration with Other Security Tools
- 21.10Benefits of Implementing a PAM Solution
- 21.11Challenges and Best Practices
- 21.12Emerging Trends in PAM
- 21.13Interview Questions and Resume Sample
- MODULE 19: IDENTITY THREAT DETECTION AND RESPONSE (ITDR)14
- 22.1Notes
- 22.2Video
- 22.3Introduction to ITDR
- 22.4Key Components of ITDR
- 22.5Key Features of ITDR Solutions
- 22.6Popular ITDR Solutions
- 22.7ITDR Integration with Other Security Tools
- 22.8Use Cases for ITDR
- 22.9Benefits of ITDR
- 22.10Challenges in ITDR Implementation
- 22.11Best Practices for ITDR
- 22.12Emerging Trends in ITDR
- 22.13Hands On Lab
- 22.14InterView Questions and sample resume
- MODULE 20: OKTA AMINISTRATION19
- 23.1Notes
- 23.2Videos
- 23.3Introduction to Okta – What is Okta Workforce Identity Cloud?
- 23.4Introduction to Okta Orgs
- 23.5Manage Okta-Sourced Users + Projects
- 23.6Integrate Okta with Active Directory-Sourced Users
- 23.7Manage Okta and LDAP integration
- 23.8Create Groups in Okta
- 23.9Automate Lifecycle Management with Okta
- 23.10Improving Security Posture with Okta Identity Governance (OIG)
- 23.11Manage Application Single Sign-On (SSO) with Okta
- 23.12Implement Multifactor Authentication (MFA) with Okta
- 23.13Explore the Basics of Identity Secure Posture Management (ISPM)
- 23.14Configure Office 365 with Okta
- 23.15Explore Okta Privileged Access
- 23.16Manage API Access with Okta
- 23.17Configure Universal Directory and User Profiles with Okta
- 23.18Configure, install and Integrate Windows AD with Okta
- 23.19STAR Script
- MODULE 21: WINDOWS AND AZURE ACTIVE DIRECTORY11
- 24.1Notes
- 24.2Videos
- 24.3Introduction to Windows and Azure Active Directory
- 24.4Understanding Windows Active Directory
- 24.5Understanding Azure Active Directory
- 24.6Integration of Windows AD with Azure AD
- 24.7Security and Compliance
- 24.8Migration Strategies
- 24.9Future Trends and Innovations
- 24.10Hands-On Lab:
- 24.11Resume Sample
- MODULE 22: AZURE ENTRA ID13
- 25.1Notes
- 25.2Videos
- 25.3Introduction to Azure Entra ID
- 25.4Setting Up Azure Entra ID
- 25.5Identity and Access Management
- 25.6Authentication and Security
- 25.7Application Management
- 25.8Advanced Features
- 25.9Monitoring and Reporting
- 25.10Integration with Microsoft and Third-Party Services
- 25.11Security Best Practices
- 25.12Hands-On Labs and Real-World Scenarios
- 25.13Performance Based Project
- MODULE 23: AZURE DEFENDER12
- 26.1Notes
- 26.2Videos
- 26.3Introduction to Microsoft Defender
- 26.4Core Components
- 26.5Key Features and Capabilities
- 26.6Architecture and Integration
- 26.7Deployment and Management
- 26.8Advanced Functionalities
- 26.9Threat Hunting and Response
- 26.10Compliance and Data Protection
- 26.11Hands on Lab
- 26.12Sample Resume and Interview Questions
- MODULE 24: BOYD AND DATA LOSS PREVENTION (DLP)14
- 27.1Notes
- 27.2Videos
- 27.3Introduction to Microsoft Intune
- 27.4Core Capabilities of Azure Intune
- 27.5Architecture and Integration
- 27.6App Management
- 27.7Device Management
- 27.8Endpoint Security
- 27.9Setting Up Microsoft Intune
- 27.10Advanced Features of Intune
- 27.11Monitoring and Reporting
- 27.12Security and Compliance
- 27.13Hands On Lab
- 27.14Projects
- MODULE: 25: INTERVIEW PREP/RESUME WORKSHOPS1
- MODULE: 26: JOB DESCRIPTION TEMPLATE3
- MODULE 27: SECURITY MAPPTING AND FRAMEWORK0