Cybersecurity

What Will You Learn?
- Course Objectives
- By the end of this 40-hour Cyber Security program, learners will be able to:
- Understand cybersecurity fundamentals
- Explain core security concepts, threat types, attack surfaces, and the CIA triad (Confidentiality, Integrity, Availability).
- Deploy and administer secure Windows domain environments
- Install and configure AD DS, manage users/groups/computers, and apply administrative controls using GUI tools and PowerShell.
- Build and troubleshoot foundational enterprise networks
- Configure basic network components (switches/routers), IP addressing, routing, ACLs, and internet connectivity.
- Implement and manage DNS services securely
- Configure DNS zones, name resolution, AD DS integration, and DNS policies; validate and troubleshoot DNS operations.
- Operate confidently in Linux environments
- Perform essential Linux administration tasks including file management, permissions, services, package management, and SSH access.
- Apply ethical hacking methodology
- Use a structured penetration testing approach across reconnaissance, scanning, enumeration, vulnerability analysis, exploitation concepts, and reporting.
- Identify and evaluate common cyber attack techniques
- Analyze practical attack vectors including web attacks (e.g., SQL injection), malware, sniffing, session hijacking, and social engineering.
- Strengthen defensive security awareness
- Recognize defensive controls such as segmentation, hardening, monitoring, IDS/firewall awareness, and basic incident response thinking.
- Develop practical problem-solving skills through CTF
- Solve real-world style challenges in crypto, forensics, web, reverse engineering, and binary analysis under time constraints.
- Work effectively in security teams
- Collaborate in attack-defense scenarios, communicate findings clearly, and prioritize remediation actions based on risk.
- Prepare for advanced cybersecurity learning paths
- Build a solid technical foundation for deeper specialization in penetration testing, SOC operations, cloud security, and certification tracks.