0% found this document useful (0 votes)
62 views7 pages

Cybersecurity Training Content

Uploaded by

tido.gerard
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
62 views7 pages

Cybersecurity Training Content

Uploaded by

tido.gerard
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

TRAINING PROGRAM STRUCTURE

COURSE NAME: INTRODUCTION TO CYBER SECURITY

NB: We also have specialized curricula by cybersecurity field for expert levels.

Format: In-person Duration: 14 weeks


Target job title: Security analyst Target certification: CompTIA’s Security+

Target Beginners in cyber security and candidates targeting CompTIA Security+


demographics: certification
This course does not have prerequisites, assumes only the most basic
Prerequisites: knowledge of computers, and makes no assumptions regarding prior security
knowledge.
● Security terminology
● Basics of computer operating systems
● Networking basics
● Intro to identity and access management
Key skills covered:
● Phishing and social engineering
● Att&ck framework
● Product security basic concepts
● Introduction to cryptographic principles

WHO IS THIS COURSE FOR

This course emphasizes hands-on training and is designed for those who have
minimal computer and technology knowledge with no prior cyber security
experience. The step-by-step teaching approach enables you to learn all the
information presented, even if some of the topics are new to you. You will learn
real-world cyber security fundamentals to serve as the foundation of your career
skills and knowledge and prepare you to get a job as a Security Analyst while
providing the basic knowledge you need to prepare for the CompTIA’s Security+
certification.

This course is for:


● People who are new to cyber security and in need of an introduction to the
fundamentals of security
● Those who feel bombarded with complex technical security terms they don't
understand but want to understand.
● Professionals who need to be conversant in basic security concepts, principles,
and terms, but who don't need "deep in the weeds" details.
● Those who have decided to make a career change to take advantage of the
job opportunities in cyber security and need formal training/certification.
● Business managers who worry that their company may be the next
mega-breach headline story on the 8 o'clock news.

TRAINING OUTLINE

Week 1: Introduction to Cyber Security

● Introduction
● Definitions
o Privacy, intellectual property, ethics, etc.
● What is cyber security?
o CIA triad, IAA triad
o The field is constantly evolving.
● Governance
o Policies, standard, and procedures
o Risk assessment, evaluation, and management
o Compliance
● Security control frameworks
o NIST CSF, ISO 27001
● Orchestrated control frameworks
o Policies, compliance, inventory, access controls, firewall managements,
IDS, IPS, auditing.
● Case study: Cyber security demo (password cracker, extract credit card data,
etc.).
Week 2: Operating Systems and Infrastructure

● Introduction to Linux Terminal


o Navigating files and directories
o Create files/directories.
o Text, file manipulation (grep, less, vim)
o Managing permissions, users
o Ssh, scp, history, find, wildcards.
o Introduction to kali Linux
o Case study 1:
● Learn how to install Kali.
● Solve the challenge - Linux games
● Introduction to Windows Terminal
o Navigating files and directories
o Create files/directories.
o Text, file manipulation (type, etc)
o Managing permissions, users
o Ssh, scp, history, find, wildcards.
o Case study 2: Solve the challenge - Windows games

Week 3: Identity and Access Management

● Basics of access and authentication.


● Definitions (identification, authentication, authorization)
● Authentication: Kerberos, Chap, Certificates, Username/password, Tokens,
Multi-factor authentication, Mutual authentication, Biometric, Local vs remote
authentication, Single Sign-on
● Authorization: Granting access, revoking access, reviewing access.
● Data access control basics: MAC, DAC, RBAC
● Access control administration: Radius, SSO, multifactor authentication
● Case study: Configure Active Directory and GPO (using VPS)
Week 4: Cryptography

● The mathematics of encryption


o Cryptography concepts
o Prime numbers, pseudo-randomness, hashing
o Authentication, authorization, accounting, certificates, PGP keys,
wildcard, public key infrastructure.
o Case study 1: How can my colleague verify that my data is correct
without seeing what my data is ?
● The computer science of encryption
o Symmetric and asymmetric cryptography
o SSL, TLS, HTTPS
o Public key infrastructure
o The importance of key management
o Case study 2: Encode and decode messages using cyberchef

Week 5: Networking Basics

● Navigating an Interconnected World


● Network Anatomy: Elements, Types, and Connections
● Wireless Connectivity and Mobility
● Creating Your Personal Home Network
● Essentials of Communication Systems
● Diverse Network Transmission Methods
● Exploring the Access Layer in Networks
● Decoding Internet Protocol (IP)
● IPv4: Segmentation and Networks
● Understanding IPv6 Addressing and Regulations
● Dynamic Address Allocation through DHCP
● Gateways Across Networks
● Address Resolution Protocol (ARP) Demystified
● Inter-Network Routing Fundamentals
● Diving into TCP and UDP Protocols
● Application Layer Services
● VLAN and Variable-Length Subnet Masking (VLSM)
● Introduction to Routing Protocols
● Network Testing Utilities and Tools
● Case study: Use of Wireshark for packet capture and traffic analysis.

Week 6: Network Defense

● Network topology
● General approach: start with a simple network diagram and add layers of
additional components, showing security challenges that arise along the way.
● Wireless routers, firewalls, switches
● Wi-fi network security (WPA, WPA2, etc)
● IPSs, IDSs
● Firewall management
● Proxies for traffic
● Network stack
● Case study: How to crack WPA using aircrack

Week 7: Attack Framework

● Network threat concepts


o Red team vs Blue team
o Ethical hacking, penetration testing methodology, attack types, OWASP
top 10
o System hardening, log hunting, Splunk, incident response.
o Case study 1: Do the web exploitation challenges chosen on a given
website
● ATT&CK Framework
o ATT&CK navigator tool
o ATT&CK framework lifecycle
o Leveraging ATT&CK as the Blue Team
▪ Detecting the defined tactics
▪ Preventing controls against the tactics
o Case study 2: Install Nessus and scan a vulnerable IP to discover critical,
high and medium vulnerabilities.

Week 8: Product Security

● Basic concepts
o What is product security? What is application security?
o Threat modeling
o Secure coding
o Secure development training (high level)
● Testing/verification techniques (e.g: static analysis, code review)
● Defenses (RASP, WAF)
● Case study 1: Using Microsoft Threat Modeling 2016 to secure an application
● Case study 2: Use snyk for software code scanning

Week 9: Human as the Weakest Link

● Threats of deception
o Social engineering (waizer training)
o Phishing, pretesting, baiting, quid pro quo, tailgating
o Personnel security
o Ransomware
o Case study: Create a payload. Command and control demo

Week 10: Ironsecur CTF (Catch The Flag) Challenge


IronSecur Catch The Flag Challenge website:

● Forensics
● Web 2 & 3
● Cryptography
● Reverse and Pwn
● Network

These challenges cover many different scenarios and are designed to introduce
you to other areas of cyber security.

Week 11 & 14 : Business immersion

● Introduction to IT project management


● Fundamentals of corporate life (professional etiquettes and behaviors,
business communications, etc.)
● Co-Ops and internship. You'll discover the world of a company and its
challenges.

You might also like