About This Course
This Cyber Security Course is designed to give you a strong foundation in how attacks happen and how to defend against them. You start with networking, operating systems and security fundamentals, and then move into ethical hacking basics, vulnerability assessment, secure configuration and incident response.
Through labs and practical exercises, you will work with popular security tools, analyse logs, simulate attacks in a safe environment and build a defender’s mindset. By the end of the course, you’ll be ready for entry‑level cybersecurity roles like security analyst, SOC analyst or IT security engineer – or to pursue advanced certifications in the field.
Syllabus Overview
Module 1
Security Fundamentals & Networking Basics
- Introduction to Cyber Security – CIA triad, threat landscape, terminology
- Computer Networks – OSI/TCP‑IP models, IP, ports, protocols
- Operating Systems Basics (Windows & Linux) for Security
- Fundamentals of Cryptography – encryption, hashing, keys (concepts)
- Security Policies, Access Control & Authentication Concepts
- Lab: Exploring network traffic & system logs (intro with tools)
Module 2
Ethical Hacking Basics & System Security
- Introduction to Ethical Hacking & Penetration Testing Phases
- Reconnaissance & Scanning – information gathering, Nmap basics
- Vulnerability Assessment – common weaknesses & misconfigurations
- System & Network Hardening – secure configuration practices
- Web Application Basics & Common Attacks (OWASP Top 10 – overview)
- Lab: Simple vulnerability scan & reporting in a controlled environment
Module 3
Security Operations, Monitoring & Incident Response
- Security Operations Centre (SOC) – roles, processes & tools
- Log Analysis & SIEM Fundamentals – detecting suspicious activity
- Incident Response Lifecycle – preparation, detection, containment, recovery
- Malware & Phishing Basics – prevention and user awareness
- Cloud & Endpoint Security – key considerations (overview)
- Compliance & Standards – basics of ISO 27001, PCI‑DSS, GDPR (concepts)
*Exact modules and tools may vary as per institution and curriculum.
Projects
Labs, Case Studies & Mini‑Projects
- Hands‑on labs for network scanning, log analysis and basic hardening
- Mini‑project: Secure configuration of a small network / system setup
- Case study: Analysing a real‑world breach and writing an incident report
- Optional mini CTF‑style exercises in a safe lab environment
- Portfolio preparation – documenting your labs and mini‑projects
