Cyber Security & Networking Basics Weekdays Physical Class Curriculum
Cyber Security & Networking Basics Weekdays Physical Class Curriculum
Physical Classes
• Day 1
• General Cyber Security Onboarding
o What is a network?
o Types of networking
o Network Topologies
o Ethernet Cabling
• Day 2
o TCP/IP Model
• Day 3
o Network protocols
Week 2:
• Day 4
o Transmission Media/cables
• Day 5
o Firewalls
o Ethernet Addressing
o IP Addressing IP Terminology
• Day 6
o Subnetting
Week 3:
• Day 7
• Day 8
o Network topologies
• Day 9
Week 4:
• Day 10:
o Firewalls and proxies (e.g. filtering methods web application firewall (WAF))
• Day 11:
• Day 12:
o Authentication and encryption protocols (e.g. Wired Equivalent Privacy (WEP) Wi-Fi
Protected Access (WPA) Extensible Authentication Protocol (EAP))
Day 1:
Introduction to Cybersecurity
Lab setup: Setting up a safe learning environment and installing necessary software (e.g. VirtualBox,
Kali Linux).
Day 2:
Unix/Linux Operating System: Access control, user authentication, privilege escalation, secure
configuration of operating systems.
Hardening Operating Systems: Techniques for hardening OS security, patch management, securing
services, and daemons.
Day 3:
Types of malware
Vulnerability analysis
Day 4:
Access control user authentication, privilege escalation, and secure configuration of operating
systems.
Unix/Linux Operating System: Access control, user authentication, privilege escalation, secure
configuration of operating systems.
Hardening Operating Systems: Techniques for hardening OS security, patch management, securing
services, and daemons.
Day 5:
Day: 6
- Risk Identification: Understanding risk identification, Methods, and techniques for risk
identification, Common types of risks, creating a risk register and documentation
- Risk Monitoring: Purpose and objectives of risk monitoring, Key performance indicators (KPIs),
Tools and techniques for risk monitoring, Continuous vs. periodic monitoring
- Risk Analysis: Understanding risk analysis, Quantitative vs. qualitative risk analysis, Tools and
techniques for risk analysis, Risk prioritization and ranking
Week 3
Day 7:
- Integration with Risk Management Frameworks: Alignment with ISO 31000 and other risk
management frameworks, Incorporating risk identification, monitoring, and analysis into enterprise
risk management (ERM), Regulatory compliance, and industry standards
Day 9:
Week 4
Day 10:
Day 11:
Day 12:
Week 5
Day 13:
- Basic Cryptography
Day 14:
- Steganography
Day 15:
- Secure Remote Access and DNS Security & Introduction to Ethical Hacking
Week 6
Day 16:
Day 17:
Day 18:
Week 7
Day 19:
Day 20:
- Introduction to firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems (IPS)
- Understanding DMZ
Week 8
Day 22:
- Key Characteristics
- Types of Cloud Services: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as
a Service (SaaS), Function as a Service (FaaS)
- Cloud Deployment Models: Public Cloud, Private Cloud, Hybrid Cloud, Community Cloud
- Benefits of Cloud Computing: Cost Efficiency, Scalability and Flexibility, Accessibility and Mobility
Day 23:
- Considerations and Implementation of Cloud Computing: Security and Data Protection, Compliance
and Regulatory Requirements, Vendor Lock-in
- Popular Cloud Service Providers: Amazon Web Services (AWS), Microsoft Azure, Google Cloud
Platform (GCP)
Day 24:
- Common Use Cases for Cloud Computing: Infrastructure Management and Virtualization, Software
Development and Testing, Big Data Analytics and Machine Learning
- Challenges, Best Practices, and Conclusion: Challenges and Risks, Data Breaches and Security
Incidents, Downtime and Service Outages, Compliance and Governance Issues
Best Practices for Cloud Adoption: Thorough Assessment and Planning, Robust Security Measures
Monitoring and Optimization