Back

Intro To Cyber Security

This course is designed for beginners who are looking to understand the foundational principles of cloud security. As cloud computing continues to dominate the technology landscape, learning how to secure cloud environments is a crucial skill for anyone interested in pursuing a career in IT, cybersecurity, or cloud computing.

Tarek

Lead Trainer

5 hr

Description
Coming soon

Course Curriculum

Introduction

4 lessons

1. Defining Cyber Security

2. Key principles of cybersecurity

3. The role of cybersecurity in modern society

4. Understanding common cybersecurity terms and concepts

Understanding the Cyber Threat Landscape

4 lessons

5. Types of cyber threats

6. Understanding the motivations behind cyberattacks

7. Real-world examples of cyberattacks and their impact

8. How cyber threats evolve and the importance of staying updated

Vulnerability Management

3 lessons

9. Identifying common vulnerabilities in systems and networks

10. Understanding the vulnerability management lifecycle

11. The risk of weak passwords, outdated software, and unpatched systems

Encryption and Authentication Fundamentals

4 lessons

12. Modern Encryption

13. Understanding Secure Authentication

14. Cryptographic Hashing

15. Understanding password hashes

Web Application Security

3 lessons

16. Introduction to OWASP Top 10

17. Securing Web Applications

18. Web Application Firewalls (WAF)

Network Security

2 lessons

19. Basic network security controls: Firewalls, VPNs, and IDS/IPS

20. Securing Wi-Fi networks

Security Monitoring and Automation

4 lessons

21. Introduction to logs and log collection

22. Introduction to SIEM

23. EDR, MDR, XDR, etc.

24. MSSPs and their role

Incident Response and Cybersecurity Recovery

3 lessons

25. Basics of Incident Response

26. Creating an Incident Response Plan

27. Business Continuity and Disaster Recovery Planning

Security Best Practices for Individuals and Organizations

4 lessons

28. How to build a strong security mindset

29. Security hygiene

30. Securing sensitive information

31. Basics of securing an organization