Course curriculum

    1. JOIN NOW

    2. ZOOM LINKS

    3. PAYMENT SCHEDULE

    1. INTRORUCTION - INSTRUCTORS

    2. INTRODUCTION - STUDENTS

    3. SCHEDULE

    4. COURSE CONTENT

    5. COURSE MATERIALS

    6. CLASS RULES

    7. MINDSET

    8. I.T FUNDAMENTALS

    9. INTRODUCTION TO IT SECURITY

    10. INTRODUCTION TO IT SECURITY PART 2

    11. INTRODUCTION TO CYBERSECURITY

    12. BASIC CYBERSECURITY CONCEPTS

    13. NETWORK SECURITY

    14. PORTS AND PROTOCOLS

    15. OSI/TCP IP Model

    16. QUESTIONS

    17. HOMEWORK 1

    1. HOMEWORK 1 - REVIEW

    2. SECURITY OPERATION CENTER (SOC)

    3. COMMON THREATS AND VULNERABILITIES

    4. NETWORK MONITORING AND DEFENSE STRATEGIES

    5. SECURITY TOOLS - SIEM

    6. SECURITY TOOLS - SOAR

    7. SECURITY TOOLS - FIREWALL

    8. SECURITY TOOLS - EDR

    9. SECURITY TOOLS - IDS

    10. SECURITY TOOLS - IPS

    11. IDS VS IPS

    12. SECURITY TOOLS - THREAT INTELLIGENCE

    13. SECURITY TOOLS - EMAIL SECURITY

    14. SECURITY TOOLS - TICKETING

    15. QUESTIONS

    16. HOMEWORK 2

    1. HOMEWORK 2 - REVIEW

    2. PHISHING

    3. TYPES OF PHISHING

    4. HOW TO INVESTIGATE A PHISHING EMAIL

    5. PHISHING SCENARIO

    6. LIVE INVESTIGATION

    7. QUESTIONS

    8. HOMEWORK 3 - PART 1

    9. HOMEWORK 3 - PART 2

    1. HOMEWORK 3 - PART 1 - REVIEW

    2. HOMEWORK 3 - PART 2 - REVIEW

    3. WHAT IS MALWARE

    4. HOW TO INVESTIGATE MALWARE

    5. MALWARE SCENARIO

    6. WIRESHARK

    7. LIVE DEMO - WIRESHARK

    8. QUESTIONS

    9. HOMEWORK 4

    1. HOMEWORK 4 - REVIEW

    2. RESUME WRITING

    3. JOB SEARCH

    4. INTERVIEW PREP

About this course

  • Free
  • 60 lessons
  • 0 hours of video content

Discover your potential, starting today