Back

Intro To Cyber Security
In-person

This course is designed for beginners who are looking to understand the foundational principles of cloud security. As cloud computing continues to dominate the technology landscape, learning how to secure cloud environments is a crucial skill for anyone interested in pursuing a career in IT, cybersecurity, or cloud computing.

Tarek

Lead Trainer

5 hr

Description
Coming soon

Course Curriculum

Introduction

4 lessons

1. Defining Cyber Security

2. Understanding common cybersecurity terms and concepts

3. The role of cybersecurity in modern society

4. Key principles of cybersecurity

Understanding the Cyber Threat Landscape

4 lessons

5. How cyber threats evolve and the importance of staying updated

6. Real-world examples of cyberattacks and their impact

7. Understanding the motivations behind cyberattacks

8. Types of cyber threats

Vulnerability Management

3 lessons

9. The risk of weak passwords, outdated software, and unpatched systems

10. Understanding the vulnerability management lifecycle

11. Identifying common vulnerabilities in systems and networks

Encryption and Authentication Fundamentals

4 lessons

12. Understanding password hashes

13. Cryptographic Hashing

14. Understanding Secure Authentication

15. Modern Encryption

Web Application Security

3 lessons

16. Introduction to OWASP Top 10

17. Web Application Firewalls (WAF)

18. Securing Web Applications

Network Security

2 lessons

19. Securing Wi-Fi networks

20. Basic network security controls: Firewalls, VPNs, and IDS/IPS

Security Monitoring and Automation

4 lessons

21. MSSPs and their role

22. EDR, MDR, XDR, etc.

23. Introduction to SIEM

24. Introduction to logs and log collection

Incident Response and Cybersecurity Recovery

3 lessons

25. Business Continuity and Disaster Recovery Planning

26. Creating an Incident Response Plan

27. Basics of Incident Response

Security Best Practices for Individuals and Organizations

4 lessons

28. Basics of securing an organization

29. Securing sensitive information

30. Security hygiene

31. How to build a strong security mindset