Cybersecurity
Begin your journey towards a cybersecurity profession. This comprehensive program equips you with the essential skills needed to excel as a security expert. Gain expertise in evaluating, preserving, and overseeing the safety of computer systems.
What you will learn
Comprehensive curriculum with 8 learning units
1
Unit 1: Cybersecurity Foundations
Project: Securing a Business Network
You will use cybersecurity principles in this assignment to evaluate and address vulnerabilities in Kali Linux, Windows 10, and Windows 11. You will show that you are skilled at lowering risks and managing possible attack vectors in a practical situation by examining security configurations, spotting flaws, and implementing industry best practices.
2
Unit 2: Defending and Securing Systems
Project: Monitoring and securing network infrastructure
You will evaluate Windows and Linux servers in this assignment by assuming the role of a cybersecurity analyst. Among your responsibilities are system security evaluation, OS hardening recommendations, compliance assurance, encryption strategy recommendations, and network security enhancement. This practice develops critical abilities for server environment security
3
Unit 3: Threats, Vulnerabilities, and Incident Response
Project: Navigating a Cybersecurity Incident
You will take on the role of a cybersecurity analyst looking into a mock cyber event in a medical facility for this project. You will investigate vulnerabilities, find attack vectors, and suggest mitigation techniques using tools such as the MITRE ATT&CK framework, Wireshark, Nmap or Nessus, and log analysis tools. To safeguard vital healthcare infrastructure, you must identify the threat actor, carry out risk and vulnerability assessments, and create plans for incident response and corrective action.
4
Unit 4: Governance, Risk, and Compliance
Project: Create a business GRC for a business
To improve delivery time and customer satisfaction, a mid-sized IT company is moving to the cloud to increase scalability, cost-effectiveness, and flexibility while speeding up product development cycles. By comprehending company processes, improving GRC documentation, strengthening cloud governance, guaranteeing compliance, and encouraging risk awareness and training, cybersecurity analysts can improve cybersecurity GRC procedures. Through these initiatives, the business will be able to manage its transition while upholding operational excellence and compliance safely.
5
Unit 5: Security Engineering Fundamentals
Project: TimeSheets Security Assessment
Since it was recently made publicly available, your company's proprietary TimeSheets application has been acting strangely, exhibiting suspicious access from odd times and places, erroneous data, and unauthorized logins. Your team was entrusted with assessing the application following the resolution of an incident. Using an initial threat model, a senior security engineer found the main cause and a number of vulnerabilities connected to encryption. They have requested that you finish the assessment and offer suggestions because of other commitments.
6
Unit 6: System Security
Project: Investigating a Cyber Espionage Attack on an Organisation
In this scenario, Tridanium renewable energy research is the target of a cyberattack on a nuclear plant. Using scanning, monitoring, and auditing tools, you will examine a Linux virtual image from a hacked server in order to determine the infection chain, weaknesses, and defenses. Initial assessment, vulnerability scanning, monitoring, infection chain analysis, and bolstering system resilience are important responsibilities. By the conclusion, you'll have practical experience with industry-standard tools, malware analysis, incident response, vulnerability scanning, and other techniques to tackle actual cybersecurity issues.
7
Unit 7: Infrastructure Security
Project: Assessing infrastructure security
An organization's IT environment is examined by an infrastructure security assessment to find security flaws, configuration errors, and vulnerabilities. You will evaluate if Tech Business A can be incorporated into a wider network in this scenario. To guarantee resilience against attacks, this entails conducting vulnerability scans, comparing setups to CIS Benchmarks, and generating a thorough report with recommendations.
8
Unit 8: Application Security
Project: Vulnerable Web Application Assessment
In order to address a recent security breach, you must thoroughly evaluate the business's web application and systems. This include looking into the underlying reason of the breach, locating weak points, and making suggestions to secure the program and stop similar occurrences in the future. Incident analysis, web application testing, documentation, and reporting are the main topics of the workshop.
