0% found this document useful (0 votes)
2 views6 pages

Syllabus - Cyber Security

The document outlines the curriculum for CompTIA A+ 220-1101 and 220-1102, covering topics such as hardware, networking, mobile devices, operating systems, security, and troubleshooting. It also details the CompTIA Security+ and CCSP certifications, focusing on security concepts, threats, vulnerabilities, cloud security, and compliance. Additionally, it includes a capstone project for practical application and preparation for various entry-level certifications.

Uploaded by

successm823
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views6 pages

Syllabus - Cyber Security

The document outlines the curriculum for CompTIA A+ 220-1101 and 220-1102, covering topics such as hardware, networking, mobile devices, operating systems, security, and troubleshooting. It also details the CompTIA Security+ and CCSP certifications, focusing on security concepts, threats, vulnerabilities, cloud security, and compliance. Additionally, it includes a capstone project for practical application and preparation for various entry-level certifications.

Uploaded by

successm823
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

CompTIA A+ 220-1101 (Core 1) – Hardware, Networking & Mobile Devices

1. Mobile Devices p hardware and features

• Mobile device types (smartphones, tablets)

• Mobile device accessories

• Mobile OS and application synchronization

2. Networking

• TCP/IP, DNS, DHCP, IP addressing

• Routers, switches, access points, and ports

• Wireless standards (Wi-Fi, Bluetooth)

• Cable types and connectors (Ethernet, coax, fiber)

• SOHO network setup

• Common network services and configuration

3. Hardware

• PC components (motherboards, CPUs, RAM, storage)

• Peripherals and connectors (USB, HDMI, printers)

• Installing and configuring power supplies and cooling

• Custom PCs (e.g., gaming, CAD workstations)

• Hardware troubleshooting

4. Virtualization and Cloud Computing

• Cloud models (IaaS, SaaS, PaaS)

• Cloud storage and applications

• Client-side virtualization

5. Hardware and Network Troubleshooting

• Troubleshooting methods and tools

• Resolving hardware and network connectivity issues

• Diagnosing printers and peripheral failures

CompTIA A+ 220-1102 (Core 2) – Operating Systems, Security & Software


1. Operating Systems

• Windows OS (installation, configuration, and tools)

• macOS, Linux, Chrome OS basics

• Command-line tools (e.g., ipconfig, ping, chkdsk)

• System utilities and control panel tools

• OS file systems and disk management

2. Security

• Threats and vulnerabilities (malware, phishing, social engineering)

• Securing devices and data

• Authentication methods (MFA, biometrics)

• Windows security settings (firewall, user permissions)

• Security best practices and physical security

3. Software Troubleshooting

• Common OS and application errors

• Mobile OS troubleshooting

• Malware removal and recovery steps

4. Operational Procedures

• Best practices in documentation and change management

• Incident response and disaster recovery

• Safety and environmental procedures (e.g., ESD, disposal)

• Professional communication and customer service

CompTIA Security+

1. General Security Concepts

• Confidentiality, Integrity, Availability (CIA Triad)

• Security Controls

o Administrative, technical, and physical controls

• Security Posture

o Risk management, asset management, threat intelligence

• Security Roles

o Security analyst, SOC analyst, penetration tester, etc.


• Frameworks and Compliance

o NIST, ISO, GDPR, HIPAA, etc.

2. Threats, Vulnerabilities, and Mitigations

• Types of Threat Actors

o Script kiddies, hacktivists, nation-states, insiders

• Threat Vectors

o Email, social engineering, physical access, etc.

• Common Attacks

o Phishing, ransomware, DDoS, password attacks, injection attacks

• Vulnerabilities

o Misconfigurations, unpatched systems, weak encryption

• Mitigation Techniques

o Patching, hardening, security tools, backups

3. Security Architecture

• Network Architecture Concepts

o DMZ, VLANs, VPNs, segmentation

• Secure Protocols

o HTTPS, SSH, SFTP, IPsec, etc.

• Cloud and Virtualization Security

o SaaS, PaaS, IaaS security best practices

• Zero Trust Architecture

o Principles and implementation

• Endpoint and Application Security

o EDR, application hardening, secure coding practices

4. Security Operations

• Security Monitoring

o SIEM, log analysis, behavioral analytics

• Incident Response
o Preparation, detection, analysis, containment, eradication, recovery, post-incident

• Digital Forensics

o Chain of custody, imaging, analysis techniques

• Business Continuity and Disaster Recovery

o Backups, DR sites, BCP/DRP planning

• Security Tools

o Firewalls, IDS/IPS, antivirus, scanners

5. Security Program Management and Oversight

• Security Policies and Procedures

• Risk Management

o Risk assessments, risk response strategies

• Governance and Compliance

o Legal and regulatory requirements

• Security Training and Awareness

• Third-Party Risk Management

o Vendor assessments, SLAs

• Ethical Hacking & Penetration Testing

● Ethical Hacking Methodology (Reconnaissance to Reporting)

● Footprinting and Reconnaissance Techniques

● Scanning and Enumeration (Nmap, Netcat, hping)

● Vulnerability Assessment Tools & Techniques

● Wireless Network Attacks (WEP/WPA Cracking)

● Social Engineering Attacks and Prevention

● Introduction to Cloud & IoT Security Risks

● Hands-on Labs: Using Metasploit, OpenVAS, Wireshark

• Web Application Security & OWASP Top 10

● Web Application Basics & Security Concepts

● OWASP Top 10 Vulnerabilities Overview:

○ SQL Injection, XSS, CSRF, IDOR, SSRF, RCE

● Tools: Burp Suite, OWASP ZAP, Nikto, SQLmap


● Lab Targets: DVWA

● Practical Exploit Techniques for SQLi, XSS, etc.

● Secure Coding Best Practices Introduction

● Hands-on: Web App Vulnerability Assessment & Exploitation

CCSP Domains and Course Content (Based on CBK - Common Body of Knowledge)

1. Cloud Concepts, Architecture and Design

• Cloud computing definitions and principles

• Cloud service models (IaaS, PaaS, SaaS)

• Cloud deployment models (public, private, hybrid, community)

• Cloud reference architectures (e.g., NIST, ISO)

• Key cloud computing characteristics

• Cloud security considerations

• Impact of cloud on enterprise architecture

2. Cloud Data Security

• Data classification and lifecycle in the cloud

• Cloud data storage architectures

• Design and implement data security strategies (e.g., encryption, tokenization, masking)

• Data rights management

• Privacy issues related to cloud data

• Data retention, deletion, and archiving

3. Cloud Platform and Infrastructure Security

• Cloud infrastructure components (network, compute, storage)

• Risk management within cloud infrastructure

• Security controls for cloud infrastructure (virtualization, containers, serverless)

• Secure virtual and physical infrastructure

• Business continuity and disaster recovery in the cloud

4. Cloud Application Security


• Secure software development lifecycle (SDLC)

• Application architecture for cloud

• Secure design and deployment in cloud environments

• APIs and web services security

• CI/CD pipeline security

• DevSecOps integration

5. Cloud Security Operations

• Cloud security operations processes

• Configuration management and automation

• Patching and vulnerability management

• Security information and event management (SIEM)

• Identity and access management (IAM)

• Logging and monitoring in the cloud

6. Legal, Risk, and Compliance

• Legal requirements and unique risks in cloud environments

• International regulations (e.g., GDPR, HIPAA)

• eDiscovery and digital forensics in cloud

• Risk management frameworks (e.g., ISO 31000, NIST RMF)

• Vendor management and third-party risk

Capstone Project and Certifications Preparation

Objective: Consolidate learning through real-world projects and prepare for entry-level certifications.

➢ Prepare Vulnerability Assessment and Penetration Testing Reports


➢ Simulated Bug Bounty Program Participation
➢ Guidance on Certifications like CompTIA A+ CompTIA Security+, CEH (Basic), Cisco
CyberOps, CCSP, Cloud Security.
➢ Career Guidance and Resume Preparation

Tools & Platforms Covered

➢ Operating Systems: Kali Linux, Ubuntu, Windows (in VM)


➢ Networking: Cisco Packet Tracer, Wireshark, Netcat, Nmap
➢ Ethical Hacking: Metasploit, Wireshark
➢ Web Security: Burp Suite, OWASP ZAP etc.
➢ Learning Platforms: DVWA, BWAPP

You might also like