Getting Started and Preparing for Success

Module 1: Getting Started And Preparing For SuccessWhat You'll Learn ✓ This is an overview of the cyber security program. There is also a platform tour and how to preparing for success. APPLY NOWDescription Welcome to the Introduction to Networking for Cyber Security...

Secure Protocols

Module 8: Secure ProtocolsWhat You'll Learn ✓ In this module, we dive deeper into TCP/IP, TLS, SDLC and some case studies. APPLY NOWDescription This module is meant to help understand basic protocols and the best practices needed to create a security focused...

Full Stack Network Security

Module 7: Full Stack Network SecurityWhat You'll Learn ✓ In this module, we dive more deeply into networking again since we have had a taste of cyber security. We will learn about access controls, firewalls, proxy servers, honeypots, VPNs, IPSEC, wireless security and...

Cryptography

Module 6: CryptographyWhat You'll Learn ✓ In this module, we introduce you to the fun world of Cryptography and different methods of crypto. We will also go over RSA vs Diffie-Helman vs PGP ending on PKI infrastructure. Description This module will cover the...

Tools

Module 10: ToolsWhat You'll Learn ✓ In this module, we learn of different types of tools from preventive tools, vulnerability management & scanning, pen testing tools & techniques and wire shark. APPLY NOWDescription Cyber toolkits! A successful analyst has a...

Symptoms of Compromise

Module 9: Symptoms of CompromiseWhat You'll Learn ✓ In this module, we cover what you should be on the look out for when looking for symptoms of compromise in host, networks and web applications. APPLY NOWDescription This module is meant to help you recognize what you...

Incident Response

Module 12: Incident ResponseWhat You'll Learn ✓ In this module, we cover incident response and how we respond to an incident, cyber forensics and contingency planning & backup. APPLY NOWDescription Incident response is a crucial approach on what to do in the event...

Testing the Infrastructure

Module 11: Testing the InfrastructureWhat You'll Learn ✓ This is where we actually test the system which we do by threat detection, social engineering, attacking websites, and attacking mobile applications. We also cover the risk, vulnerability impact and privacy...

Identify & Analyze Threats

Module 5: Identify & Analyse ThreatsWhat You'll Learn ✓ In this module, we introduce you to the hacker’s mindset, security team roles, different types of tools, risk management, security awareness and finally we go over two case studies. APPLY NOWDescription In...

Core Protocols & Network Models

Module 3: Core Protocols & Network ModelsWhat You'll Learn ✓ Here we introduce TCP, UDP, Ports, DNS, and the OSI + TCP/IP model. Description In this module we will explore the layers of the OSI Model. We will also review the principles of the TCP/IP Model and how...

Core Networking Concepts

Module 2: Core Networking ConceptsWhat You'll Learn  ✓ This is an introduction to networking including frames, MAC address, IPv4, ARP, IPv6 and wireless LANS.Description In the Core Networking Concepts module we cover frames, MAC addresses and broadcast domains. Then...

Systems and Security

Module 4: Systems and SecurityWhat You'll Learn ✓ In this module, we introduce the fun world of command line tools, operating system security, WLAN, ACL, Firewall & VPNs, Network segmentation, IDS, IPS, attacks and vulnerabilities and finally we start our...