Module 1: Introduction to Cyber Security
1. Overview of Cyber Security
- Definition, importance, current trends
- Introduction to the threat landscape
2. Types of Cyber Attacks
- Malware, Phishing, Ransomware, DDoS, Social Engineering
- Case studies of major cyber-attacks
3. Cyber Security Concepts and Terminology
- Confidentiality, Integrity, Availability (CIA Triad)
- Risk, Vulnerability, Threats, and Attacks
4. Cybersecurity Frameworks and Compliance
- NIST, ISO/IEC 27001, GDPR, HIPAA
- Introduction to cybersecurity standards
Module 2: Network Security
5. Introduction to Networking and TCP/IP
- Basics of networking, OSI Model, and TCP/IP Protocol Suite
- IP addressing, Subnetting, DNS, and DHCP
6. Network Security Devices
- Firewalls, IDS/IPS, VPNs, Proxy Servers
- Hands-on: Configuring a basic firewall
7. Network Security Protocols
- SSL/TLS, HTTPS, SSH, IPsec
- Hands-on: Setting up secure communications using SSL/TLS
8. Securing Wireless Networks
- WPA2, WEP, Rogue Access Points
- Hands-on: Securing a wireless network
9. Introduction to Cryptography
- Encryption, Decryption, Symmetric and Asymmetric keys
- Overview of AES, RSA, and hashing algorithms
10. Public Key Infrastructure (PKI)
- Digital certificates, Certificate Authorities (CA)
- Hands-on: Creating and using digital certificates
11. Virtual Private Networks (VPNs)
- Secure tunneling, IPsec VPNs, SSL VPNs
- Hands-on: Configuring a VPN
12. Quiz and Recap of Network Security Concepts
Module 3: Web Security
13. Web Application Security Fundamentals
- Common vulnerabilities: OWASP Top 10
- Overview of SQL Injection, Cross-Site Scripting (XSS)
14. Authentication and Authorization
- Password security, Multi-factor authentication (MFA)
- Hands-on: Implementing MFA in a web application
15. Securing APIs
- API vulnerabilities and protection measures
- Hands-on: Securing a REST API using OAuth 2.0
16. Web Application Firewalls (WAF)
- How WAFs work, Setting up a WAF
- Hands-on: Configuring a WAF for a web app
Module 4: Ethical Hacking and Penetration Testing
17. Introduction to Ethical Hacking
- Role of ethical hackers, Ethical hacking phases
- Legal aspects of hacking (White Hat, Black Hat, Grey Hat)
18. Footprinting and Reconnaissance
- Information gathering techniques, OSINT
- Hands-on: Using tools like Nmap, Whois, and Maltego
19. Scanning and Vulnerability Analysis
- Port scanning, Network scanning, Vulnerability scanning
- Hands-on: Scanning a target network using Nmap
20. Exploitation and Post-Exploitation
- Exploiting vulnerabilities, Gaining access
- Hands-on: Exploiting a vulnerable machine using Metasploit
21. Social Engineering
- Phishing, Pretexting, Baiting, and Tailgating
- Hands-on: Simulating a phishing attack (in a controlled environment)
22. Password Cracking Techniques
- Brute-force, Dictionary attacks, Rainbow tables
- Hands-on: Cracking passwords using tools like John the Ripper
23. Buffer Overflow and Exploit Development
- Understanding buffer overflows, Exploiting software vulnerabilities
- Hands-on: Writing a basic buffer overflow exploit
24. Penetration Testing Reporting
- Writing a professional pentest report
- Hands-on: Creating a report from a pentest scenario
Module 5: Incident Response and Forensics
25. Introduction to Incident Response
- Incident response lifecycle: Preparation, Detection, Containment
- Hands-on: Creating an incident response plan
26. Detecting and Handling Incidents
- Incident detection tools, Log analysis, SIEM
- Hands-on: Using SIEM tools like Splunk for threat detection
27. Forensics Fundamentals
- Digital forensics process, Evidence collection, Chain of custody
- Hands-on: Imaging and analyzing a forensic image
28. Network Forensics
- Traffic analysis, Packet sniffing with Wireshark
- Hands-on: Analyzing network traffic for malicious activity
29. Disk Forensics
- File systems, Deleted file recovery, Data carving
- Hands-on: Recovering deleted files from a disk image
30. Memory Forensics
- Analyzing memory dumps, Detecting malware in memory
- Hands-on: Analyzing memory using Volatility
31. Mobile Device Forensics
- Extracting data from mobile devices, Analyzing app data
- Hands-on: Forensic analysis of an Android/iOS device
32. Quiz and Recap of Incident Response and Forensics
Module 6: Malware Analysis and Reverse Engineering
33. Introduction to Malware Analysis
- Types of malware: Viruses, Worms, Trojans, Ransomware
- Hands-on: Analyzing a piece of malware in a sandbox environment
34. Static vs Dynamic Analysis
- Static analysis: Analyzing code without execution
- Dynamic analysis: Analyzing code during execution
35. Reverse Engineering with IDA Pro
- Introduction to IDA Pro, Assembly basics
- Hands-on: Analyzing a malicious binary
36. Analyzing Ransomware
- Understanding ransomware behavior, Decrypting ransomware files
- Hands-on: Simulating a ransomware attack and analyzing it
37. Behavioral Analysis of Malware
- Monitoring system changes, Analyzing malware behaviors
- Hands-on: Behavioral analysis using Cuckoo Sandbox
38. Analyzing Network-based Malware
- Identifying malware C&C servers, Network Indicators of Compromise (IOC)
- Hands-on: Network traffic analysis of a malware attack
39. Anti-Reverse Engineering Techniques
- Techniques used by malware to avoid detection
- Hands-on: Bypassing anti-debugging and anti-VM measures
40. Quiz and Malware Analysis Project
Module 7: Cloud Security
41. Introduction to Cloud Security
- Cloud architecture, Security in AWS, Azure, Google Cloud
- Hands-on: Securing an AWS environment
42. Cloud Threats and Vulnerabilities
- Misconfigurations, Data breaches, Insider threats
- Case studies of cloud security breaches
43. Securing Cloud Infrastructure
- Identity and Access Management (IAM), Encryption, and Monitoring
- Hands-on: Configuring IAM roles and policies in AWS
44. Cloud Security Best Practices
- Securing cloud storage, VPNs in the cloud, Key management
- Hands-on: Implementing cloud security best practices
Module 8: Advanced Topics in Cyber Security
45. Artificial Intelligence in Cyber Security
- Using AI/ML for threat detection
- Case studies of AI-powered cybersecurity tools
46. Blockchain and Cyber Security
- Understanding blockchain technology and its security implications
47. IoT Security
- Securing IoT devices, Risks and challenges
- Hands-on: Securing an IoT network
48. Zero Trust Security Model
- Understanding zero trust architecture
- Hands-on: Implementing zero trust principles in a network
Module 9: Cyber Security Career and Certifications
49. Cyber Security Career Paths
- Different roles: SOC Analyst, Pentester, Forensic Investigator, CISO
50. Cyber Security Certifications
- Overview of popular certifications: CEH, CISSP, CompTIA Security+, OSCP
51. Building a Cyber Security Portfolio
- Showcasing your skills and projects
52. Job Market and Resume Building
- Crafting a security-focused resume and LinkedIn profile
53. Interview Preparation
- Common interview questions for cybersecurity roles
54. Final Project Review and Feedback