This Cyber Security course provides a thorough exploration of cybersecurity concepts, practices, and tools designed to protect digital assets from attacks, 
threats, and vulnerabilities. It equips students with both theoretical knowledge and practical skills through hands-on labs, real-world case studies, and security tools used in the industry.


Module 1: Introduction to Cyber Security
1. Overview of Cyber Security

  •     Definition, importance, current trends
  •     Introduction to the threat landscape

2. Types of Cyber Attacks

  •     Malware, Phishing, Ransomware, DDoS, Social Engineering
  •     Case studies of major cyber-attacks

3. Cyber Security Concepts and Terminology

  •     Confidentiality, Integrity, Availability (CIA Triad)
  •     Risk, Vulnerability, Threats, and Attacks

4. Cybersecurity Frameworks and Compliance

  •     NIST, ISO/IEC 27001, GDPR, HIPAA
  •     Introduction to cybersecurity standards


Module 2: Network Security
5. Introduction to Networking and TCP/IP

  •     Basics of networking, OSI Model, and TCP/IP Protocol Suite
  •     IP addressing, Subnetting, DNS, and DHCP

6. Network Security Devices

  •     Firewalls, IDS/IPS, VPNs, Proxy Servers
  •     Hands-on: Configuring a basic firewall

7. Network Security Protocols

  •     SSL/TLS, HTTPS, SSH, IPsec
  •     Hands-on: Setting up secure communications using SSL/TLS

8. Securing Wireless Networks

  •     WPA2, WEP, Rogue Access Points
  •     Hands-on: Securing a wireless network

9. Introduction to Cryptography

  •     Encryption, Decryption, Symmetric and Asymmetric keys
  •     Overview of AES, RSA, and hashing algorithms

10. Public Key Infrastructure (PKI)

  •      Digital certificates, Certificate Authorities (CA)
  •      Hands-on: Creating and using digital certificates

11. Virtual Private Networks (VPNs)

  •      Secure tunneling, IPsec VPNs, SSL VPNs
  •      Hands-on: Configuring a VPN

12. Quiz and Recap of Network Security Concepts

Module 3: Web Security
13. Web Application Security Fundamentals

  •      Common vulnerabilities: OWASP Top 10
  •      Overview of SQL Injection, Cross-Site Scripting (XSS)

14. Authentication and Authorization

  •      Password security, Multi-factor authentication (MFA)
  •      Hands-on: Implementing MFA in a web application

15. Securing APIs

  •      API vulnerabilities and protection measures
  •      Hands-on: Securing a REST API using OAuth 2.0

16. Web Application Firewalls (WAF)

  •      How WAFs work, Setting up a WAF
  •      Hands-on: Configuring a WAF for a web app

Module 4: Ethical Hacking and Penetration Testing
17. Introduction to Ethical Hacking

  •      Role of ethical hackers, Ethical hacking phases
  •      Legal aspects of hacking (White Hat, Black Hat, Grey Hat)

18. Footprinting and Reconnaissance

  •      Information gathering techniques, OSINT
  •      Hands-on: Using tools like Nmap, Whois, and Maltego

19. Scanning and Vulnerability Analysis

  •      Port scanning, Network scanning, Vulnerability scanning
  •      Hands-on: Scanning a target network using Nmap

20. Exploitation and Post-Exploitation

  •      Exploiting vulnerabilities, Gaining access
  •      Hands-on: Exploiting a vulnerable machine using Metasploit

21. Social Engineering

  •      Phishing, Pretexting, Baiting, and Tailgating
  •      Hands-on: Simulating a phishing attack (in a controlled environment)

22. Password Cracking Techniques

  •      Brute-force, Dictionary attacks, Rainbow tables
  •      Hands-on: Cracking passwords using tools like John the Ripper

23. Buffer Overflow and Exploit Development

  •      Understanding buffer overflows, Exploiting software vulnerabilities
  •      Hands-on: Writing a basic buffer overflow exploit

24. Penetration Testing Reporting

  •      Writing a professional pentest report
  •      Hands-on: Creating a report from a pentest scenario

Module 5: Incident Response and Forensics
25. Introduction to Incident Response

  •      Incident response lifecycle: Preparation, Detection, Containment
  •      Hands-on: Creating an incident response plan

26. Detecting and Handling Incidents

  •      Incident detection tools, Log analysis, SIEM
  •      Hands-on: Using SIEM tools like Splunk for threat detection

27. Forensics Fundamentals

  •      Digital forensics process, Evidence collection, Chain of custody
  •      Hands-on: Imaging and analyzing a forensic image

28. Network Forensics

  •      Traffic analysis, Packet sniffing with Wireshark
  •      Hands-on: Analyzing network traffic for malicious activity

29. Disk Forensics

  •      File systems, Deleted file recovery, Data carving
  •      Hands-on: Recovering deleted files from a disk image

30. Memory Forensics

  •      Analyzing memory dumps, Detecting malware in memory
  •      Hands-on: Analyzing memory using Volatility

31. Mobile Device Forensics

  •      Extracting data from mobile devices, Analyzing app data
  •      Hands-on: Forensic analysis of an Android/iOS device

32. Quiz and Recap of Incident Response and Forensics

Module 6: Malware Analysis and Reverse Engineering
33. Introduction to Malware Analysis

  •      Types of malware: Viruses, Worms, Trojans, Ransomware
  •      Hands-on: Analyzing a piece of malware in a sandbox environment

34. Static vs Dynamic Analysis

  •      Static analysis: Analyzing code without execution
  •      Dynamic analysis: Analyzing code during execution

35. Reverse Engineering with IDA Pro

  •      Introduction to IDA Pro, Assembly basics
  •      Hands-on: Analyzing a malicious binary

36. Analyzing Ransomware

  •      Understanding ransomware behavior, Decrypting ransomware files
  •      Hands-on: Simulating a ransomware attack and analyzing it

37. Behavioral Analysis of Malware

  •      Monitoring system changes, Analyzing malware behaviors
  •      Hands-on: Behavioral analysis using Cuckoo Sandbox

38. Analyzing Network-based Malware

  •      Identifying malware C&C servers, Network Indicators of Compromise (IOC)
  •      Hands-on: Network traffic analysis of a malware attack

39. Anti-Reverse Engineering Techniques

  •      Techniques used by malware to avoid detection
  •      Hands-on: Bypassing anti-debugging and anti-VM measures

40. Quiz and Malware Analysis Project

Module 7: Cloud Security
41. Introduction to Cloud Security

  •      Cloud architecture, Security in AWS, Azure, Google Cloud
  •      Hands-on: Securing an AWS environment

42. Cloud Threats and Vulnerabilities

  •      Misconfigurations, Data breaches, Insider threats
  •      Case studies of cloud security breaches

43. Securing Cloud Infrastructure

  •      Identity and Access Management (IAM), Encryption, and Monitoring
  •      Hands-on: Configuring IAM roles and policies in AWS

44. Cloud Security Best Practices

  •      Securing cloud storage, VPNs in the cloud, Key management
  •      Hands-on: Implementing cloud security best practices

Module 8: Advanced Topics in Cyber Security
45. Artificial Intelligence in Cyber Security

  •      Using AI/ML for threat detection
  •      Case studies of AI-powered cybersecurity tools

46. Blockchain and Cyber Security

  •      Understanding blockchain technology and its security implications

47. IoT Security

  •      Securing IoT devices, Risks and challenges
  •      Hands-on: Securing an IoT network

48. Zero Trust Security Model

  •      Understanding zero trust architecture
  •      Hands-on: Implementing zero trust principles in a network

Module 9: Cyber Security Career and Certifications
49. Cyber Security Career Paths

  •      Different roles: SOC Analyst, Pentester, Forensic Investigator, CISO

50. Cyber Security Certifications

  •      Overview of popular certifications: CEH, CISSP, CompTIA Security+, OSCP

51. Building a Cyber Security Portfolio

  •      Showcasing your skills and projects

52. Job Market and Resume Building

  •      Crafting a security-focused resume and LinkedIn profile

53. Interview Preparation

  •      Common interview questions for cybersecurity roles

54. Final Project Review and Feedback

 

botão whatsapp