Curriculum
- 18 Sections
- 149 Lessons
- 17 Weeks
Expand all sectionsCollapse all sections
- MODULE 1: INTRODUCTION TO CYBERSECURITY8
- 1.1Notes/Video
- 1.2Objective: Understand the landscape of cyber threats and vulnerabilities across traditional and cloud environments.
- 1.3Introduction to Cybersecurity Threats
- 1.4Vulnerabilities: Discovery and Exploitation
- 1.5Cloud-Specific Threats and Vulnerabilities
- 1.6Threat Intelligence and Detection Techniques
- 1.7Risk Mitigation and Defense Strategies
- 1.8Capstone: Threat & Vulnerability Report
- MODULE 2: CYBER SECURITY AND CLOUD FRAMEWORKS11
- 2.1Videos/Notes
- 2.2Objectives:
- 2.3Introduction to Security Frameworks
- 2.4NIST Cybersecurity Framework (NIST CSF)
- 2.5NIST SP 800-53 & Risk Management Framework (RMF)
- 2.6ISO/IEC 27001 & 27002
- 2.7CIS Controls Framework
- 2.8Cloud Security Alliance (CSA) & CCM
- 2.9FedRAMP for Cloud Compliance
- 2.10CMMC (Cybersecurity Maturity Model Certification)
- 2.11Capstone: Framework Comparison & Cloud Alignment
- MODULE 3: INTRODUCTION TO SOC AUDIT AND COMPLIANCE4
- MODULE 4: UNDERSTANDING ZERO TRUST9
- 4.1Notes/Video
- 4.2Objective: Implement Zero Trust architecture using real tools, posture-based access, and policy-as-code.
- 4.3ZTA Pillars: All – Full Zero Trust Stack
- 4.4Introduction to Zero Trust Architecture (ZTA)
- 4.5ZTA Components & Pillars
- 4.6Designing Zero Trust Architectures
- 4.7Zero Trust in Practice: Cloud & Hybrid Environments
- 4.8Governance, Risk, and Compliance in Zero Trust
- 4.9Capstone: Zero Trust Architecture Proposal
- MODULE 5: CLOUD SECURITY FOUNDATIONS9
- 5.1Notes/Video
- 5.2Objective: Establish a solid understanding of cloud platforms, IAM, security principles, and regulatory alignment.
- 5.3Introduction to Cloud Security
- 5.4Cloud Threats & Vulnerabilities
- 5.5Cloud Security Best Practices
- 5.6Cybersecurity Frameworks Overview
- 5.7NIST Cybersecurity Framework (CSF), RMF, FEDRAMP, ISO/IEC 27001 / 27017, Zero Trust Architecture (ZTA)
- 5.8Mapping Frameworks to Cloud Services
- 5.9Labs:
- MODULE 6: INTRODUCTION TO AWS CLOUD SERVICES12
- 6.1Objective:
- 6.2Introduction to Cloud
- 6.3Getting Started with AWS Identity and Access Management (IAM)
- 6.4Getting Started with the AWS Command Line Interface (CLI)
- 6.5Foundations of AWS Policy – Principles and Best Practices
- 6.6Introduction to Single Sign-On – Federated Identities on AWS
- 6.7Introduction to AWS IAM, SSO, Federation Identities
- 6.8Introdcution to Authentication and Authorization
- 6.9AWS Storage Services S3
- 6.10Introduction to AWS VPC
- 6.11Overview of Core Azure Services:
- 6.12Networking and Security Foundations
- MODULE 7: INTRODUCTION TO MICROSOFT AZURE CLOUD SERVICES9
- MODULE 8: INTRODUCTION TO MICROSOFT OFFICE 3659
- 8.1Notes/Video
- 8.2Objective:
- 8.3Cloud Concepts and Microsoft 365 Overview
- 8.4Core Microsoft 365 Services and Productivity Solutions
- 8.5Microsoft 365 Collaboration and Mobility Features
- 8.6Microsoft 365 Identity and Access Management
- 8.7Security, Compliance & Trust in Microsoft 365
- 8.8Microsoft 365 Subscriptions, Licensing, and Support
- 8.9Microsoft 365 Pricing and Billing
- MODULE 9: MICROSOFT SECURITY OPERATIONS ANALYST ASSOCIATE10
- 9.1Notes/Video
- 9.2Objective:
- 9.3Introduction to SC-200 & Microsoft Security Operations
- 9.4Mitigating Threats with Microsoft Defender for Endpoint
- 9.5Mitigating Threats with Microsoft Defender for Office 365
- 9.6Mitigating Cloud Threats with Microsoft Defender for Cloud
- 9.7Mitigating Identity Threats with Microsoft Defender for Identity
- 9.8Mitigating Threats Using Microsoft Sentinel (SIEM/SOAR)
- 9.9Investigating, Hunting, and Responding to Threats
- 9.10Compliance, Governance & Reporting
- MODULE 10: AWS CLOUD AND AZURE SERVICE COMPARED9
- MODULE 11: WINDOWS SERVER, ACTIVE DIRECTORY & MIGRATION10
- 11.1Introduction to Windows Server
- 11.2Networking Basics for Server Administration
- 11.3Managing Server Roles and Features
- 11.4Active Directory Fundamentals
- 11.5Managing Active Directory Objects
- 11.6Group Policy Management
- 11.7DNS and DHCP Integration with Active Directory
- 11.8Active Directory Backup and Recovery
- 11.9Active Directory Migration and Upgrades
- 11.10Azure AD and Hybrid Integration
- MODULE 12: MASTERING MICROSOFT ENTRA ID & AZURE IDENTITY GOVERNANCE9
- MODULE 13: INTRODUCTION TO OKTA AND IAM CONCEPT11
- MODULE 14: PRIVILEGED ACCESS MANAGEMENT (PAM)8
- 14.1Notes/Video
- 14.2Objective: Mitigate privilege abuse with PAM tools and strategies.
- 14.3ntroduction to PAM and CyberArk
- 14.4CyberArk Core Architecture & Vault Implementation
- 14.5Session Management and Monitoring
- 14.6CyberArk in Cloud and Hybrid Environments
- 14.7Access Request Workflow and Policy Enforcement
- 14.8Capstone: PAM Solution Design Using CyberArk
- MODULE 15: CLOUD SECURITY ENGINEERING8
- MODULE 16: MICROSOFT SECURITY OPERATIONS ANALYST ASSOCIATE9
- 16.1Notes/Video
- 16.2Introduction to SC-200 & Microsoft Security Operations
- 16.3Mitigating Threats with Microsoft Defender for Endpoint
- 16.4Mitigating Threats with Microsoft Defender for Office 365
- 16.5Mitigating Identity Threats with Microsoft Defender for Identity
- 16.6Mitigating Cloud Threats with Microsoft Defender for Cloud
- 16.7Mitigating Threats Using Microsoft Sentinel (SIEM/SOAR)
- 16.8Investigating, Hunting, and Responding to Threats
- 16.9Compliance, Governance & Reporting
- MODULE 17: SECURITY FACTOR WITHIN THE SDLC0
- MODULE 18: MOST DEMANDED IAM & IDENTITY-FOCUSED CERTIFICATIONS4