About the Cybersecurity Course

This 4-month comprehensive cybersecurity course is designed to provide in-depth knowledge and hands-on skills needed to excel in the field. With 2 lessons per week, each lasting 3 hours, the course balances theory with extensive practical labs, ensuring a deep understanding of key cybersecurity concepts and tools. By the end of this course, you will be well-prepared to take the CompTIA certification exams and pursue a successful career in cybersecurity, armed with the skills to protect networks, manage security threats, and implement cutting-edge security solutions.

  • Hands-on Practice and Labs: A major focus on practical exercises to reinforce learning through real-world applications and scenarios.

  • Training on Real Projects: Engage in actual projects that simulate real-world cybersecurity challenges, giving you valuable experience.

  • Experienced Instructors: Learn from cybersecurity professionals with years of industry experience, ensuring you gain the latest and most relevant knowledge.

  • Ongoing Support: Access personalized support from instructors and peers throughout the course to help you succeed at every step.

  • CompTIA Security + Certification Preparation This course is aligned with CompTIA's certification objectives, providing targeted preparation for exams like CompTIA Security+ and other relevant certifications.

  • Prerequisites: Basic knowledge of Windows and LINUX OS, Application servers, Database). Networking concepts such as LAN, WAN, Internet and OSI model.

Course curriculum

  • 1

    Chapter 1: Introduction to Cybersecurity

    • Introduction to Information Security

    • Current Cyber Threats and Cybersecurity Sites References

    • Security Terminology and Tools

  • 2

    Chapter 2: Network Security Fundamentals

    • Network Design and Components

    • Common Protocols and Ports

    • Basics of Network Defense and Countermeasures

  • 3

    Chapter 3: Advanced Network Security

    • Firewalls, Intrusion Detection Systems (IPS/IDS), and Honeypots

    • Threat Actors and Attack Phases

  • 4

    Chapter 4: System and Endpoint Security

    • Security in Operating Systems and Cloud

    • Endpoint Security and Scripting

  • 5

    Chapter 5: Application and Data Security

    • Security in Software and Databases

    • Hacking Platforms and Tools

  • 6

    Chapter 6: Threat Management and Vulnerability Assessment

    • Vulnerability Management and Security Scanning

    • Security Information and Event Management (SIEM)

  • 7

    Chapter 7: Security Policy and Planning

    • Security Policy Design and Implementation

    • Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)

  • 8

    Chapter 8: Practical Deployment of Security Technologies

    • Active Directory: Managing user access.

    • SIEM: Setting up security event management systems.

    • Firewall: Configuring and managing firewalls.

    • IPS/IDS: Implementing detection and prevention systems.

    • Endpoint Protection: Installing and managing endpoint security solutions.

    • Vulnerability Scans: Running system vulnerability assessments.

    • Web Application Scans: Testing and securing web applications.

  • 9

    Chapter 9: CompTIA Security + certification

    • CompTIA Security + Certification Preparation

    • Exam simulation