Course curriculum
-
1
Introduction to Certified Cybersecurity Expert
-
Introduction to Certified Cybersecurity Expert
-
-
2
Overview of Cybersecurity
-
What is Cybersecurity
-
Differences between Cybersecurity and Information Security
-
Common Cybersecurity terms
-
Physical and logical security
-
Malicious Actors and their goals
-
Why Cybersecurity - overview of cybersecurity threats and risks
-
Role of Cloud Computing in Cybersecurity
-
Principles of design and implementation of security mechanisms
-
-
3
Types of Cybersecurity Attacks and Threats
-
Malware
-
Spyware and Adware
-
Ransomware
-
Social Engineering
-
Phishing
-
Brute Force Attacks
-
Man-in-the-middle Attacks
-
DoS and DDoS Attacks
-
Network Attacks
-
-
4
Cybersecurity Job Functions
-
Players/Stakeholders in Cybersecurity
-
Cybersecurity career opportunities
-
Cybersecurity organization structure
-
Security team composition
-
Role of a Cybersecurity professional in general
-
Role of a Security Analyst
-
Role of a CISO (Chief Information Security Officer)
-
-
5
Types of Security
-
Security layers and vulnerabilities
-
Administrative security
-
Logical security
-
Data security
-
Security Operations (SecOps)
-
Network security
-
Database security
-
Web security
-
Attacks, exploits and preventive methods
-
-
6
Reconnaissance
-
Passive Reconnaissance
-
Active Reconnaissance
-
Identifying and mitigating risks with reconnaissance
-
Legal and ethical considerations of reconnaissance
-
-
7
Defensive Security
-
Need for Defensive Cybersecurity techniques
-
Security controls
-
Data Loss prevention Systems (DLP)
-
Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)
-
Anti-malware and anti-virus software
-
Identifying attack surface
-
Honeypot and DMZ
-
Defensive security by anonymity and pseudonymity
-
Backup as the insurance against attacks
-
-
8
Offensive Security and Reverse Engineering
-
Overview of Offensive Cybersecurity techniques
-
Penetration Testing Overview
-
Threats and Threat Profiling
-
Advanced Persistent Threats
-
Exploitation
-
Reverse Engineering concepts
-
Red Team, Blue Team, Purple Team
-
Metadata Analysis
-
Malware Analysis
-
Phishing Analysis
-
-
9
Cybersecurity Tools and Software
-
Using open-source tools
-
Using commercial off-the-self tools
-
Using virtualization for Cybersecurity work
-
Cybersecurity OS Distributions - Kali Linux, Parrot OS
-
Cybersecurity test environments
-
Licensing considerations
-
-
10
Encryption and Cryptography
-
Basic concepts of cryptography
-
Cryptographic ciphers (Symmetric and Asymmetric)
-
Encryption algorithms
-
Data encryption and key management
-
Attacks against encryption
-
Certificates
-
Public Key Infrastructure (PKI)
-
Certificate management
-
-
11
Identity and Access Management
-
Identity and Access Management overview
-
Authentication and authorization
-
Single sign-on and federated identity
-
Identity Governance and Administration
-
Authentication protocols
-
Single-Factor and multi-factor authentication
-
-
12
Cybersecurity Processes
-
Cybersecurity Management Processes
-
Secure application development and deployment
-
Change and release management
-
Automation for Cybersecurity
-
QA process for Cybersecurity
-
-
13
Cyber Forensics
-
Need for Cyber Forensics
-
Principles of Cyber Forensics
-
Digital Evidence - collection and analysis
-
Fingerprinting
-
Log analysis
-
Mobile Forensics
-
Using Cyber Forensics in law enforcement
-
Ethical Considerations in Cyber Forensics
-
Role of Human Intelligence (HUMINT) in Cyber Forensics
-
-
14
Network Security and System Hardening
-
Network protocols and architecture
-
Network security best practices
-
Network Defense and Countermeasures (NDC)
-
Firewalls, IDS, and IPS for Network Security
-
Reverse proxies
-
Virtual Private Networks (VPN) and secure remote access
-
DMZ and virtual hosts
-
Endpoint Security
-
Network packet analysis
-
System hardening
-
Patch management
-
-
15
Wireless Security
-
Wireless security best practices
-
WAP security - Part 1
-
WAP security - Part 2
-
Wireless live packet capture
-
Wireless packet capture analysis
-
Type of attacks malicious actors do on wireless networks
-
-
16
Cyber Threat Intelligence
-
Understanding the threat landscape
-
Types of Threat Intelligence
-
Gathering and analyzing threat intelligence data
-
Users of Threat Intelligence
-
Using threat intelligence to improve security
-
-
17
Ethical Hacking and Penetration Testing (Pen Test)
-
Purpose of Ethical Hacking
-
White Hat vs Black Hat hackers
-
Phases in Ethical Hacking
-
Exploitation techniques
-
Ethical Hacking for application security
-
Ethical Hacking for hardware security
-
-
18
Advanced Concepts
-
Multi-Layer Security
-
SIEM
-
Attack Vectors
-
Mobile endpoint security
-
Root Cause Analysis
-
Internet of Things (IoT) security
-
Edge Computing and Cybersecurity
-
Cyber Warfare
-
Blockchain Security
-
Incident Response and Disaster Recovery
-
-
19
Ethics, Compliance, and Standards
-
Overview of regulatory compliance
-
Commonly used security standards and frameworks
-
Cyber Laws
-
Ethics for a Cybersecurity Professional
-
-
20
Study Material
-
Study Material
-