Curriculum
11 Sections
44 Lessons
10 Weeks
Expand all sections
Collapse all sections
Introduction to Cybersecurity
4
1.1
What is cybersecurity
1.2
Importance & scope
1.3
Common cyber threats
1.4
CIA triad (Confidentiality, Integrity, Availability)
Types of Cyber Attacks
4
2.1
Phishing & social engineering
2.2
Malware types (virus, worm)
2.3
Ransomware basics
2.4
Denial of Service (DoS)
Network Security Fundamentals
4
3.1
Network types & protocols
3.2
Firewalls & VPNs
3.3
Intrusion detection systems
3.4
Secure network design
System & Endpoint Security
4
4.1
Operating system hardening
4.2
Antivirus & EDR tools
4.3
Patch management
4.4
Secure device usage
Web & Application Security
4
5.1
Secure coding practices
5.2
OWASP Top 10 overview
5.3
Cross-site scripting (XSS)
5.4
SQL injection basics
Authentication & Access Control
4
6.1
Password policies
6.2
Multi-factor authentication
6.3
Role-based access
6.4
Identity management systems
Cryptography Basics
4
7.1
Encryption & decryption
7.2
Symmetric vs asymmetric
7.3
Digital signatures
7.4
SSL/TLS overview
Cybersecurity Tools & Practices
4
8.1
Using Wireshark
8.2
Nmap scanning basics
8.3
Password managers
8.4
SIEM introduction
Data Privacy & Protection
4
9.1
Personal data security
9.2
Data classification
9.3
Backup strategies
9.4
Compliance (GDPR, HIPAA)
Incident Response & Recovery
4
10.1
Incident response steps
10.2
Containment & eradication
10.3
Recovery planning
10.4
Reporting and documentation
Career & Certification Pathways
4
11.1
Popular job roles
11.2
Key certifications (CEH, CompTIA Security+)
11.3
Learning resources
11.4
Building a cybersecurity portfolio
Cybersecurity Essentials
Search
This content is protected, please
login
and enroll in the course to view this content!
Home
Courses
Search
Search
Account
Login with your site account
Lost your password?
Remember Me
Not a member yet?
Register now
Register a new account
Are you a member?
Login now
Modal title
Main Content