About Course
Introduction
Welcome to our comprehensive cybersecurity fundamentals course! Designed specifically for newcomers, this course will provide you with an in-depth understanding of essential cybersecurity concepts. Whether you aspire to become a cybersecurity analyst, engineer, or consultant, this course will lay the foundation for your success.
Prerequisites
- Any Bachelor’s degree
- 0 to 3 years of experience in any field
- Basic knowledge of networking and software
- Learning attitude
Course Duration
- Duration: 1 month (30 hours of training)
- Mode of Training: Classroom and Online
Summary of Learning
- Understanding Basic Security Concepts
- Different types of security threats
- Key principles of keeping information safe
- CIA Triad (Confidentiality, Integrity, Availability)
- Identifying and managing risks
- Windows as System – Hands-on Practical
- Windows command line interface (CLI) commands
- Creating and managing user accounts
- Keeping Windows updated
- Understanding OS functionality
- Security Aspects of Windows Server
- Overview of Windows Server
- Active Directory basics
- User configuration
- Domain controller setup
- Linux – Operating System Hands-on
- Basic Linux commands
- Managing users and permissions
- Writing simple scripts
- Installing and updating software
- Ubuntu Server – Understanding
- Installing Ubuntu Server
- Setting up network connections
- Managing services (like web servers)
- Checking system performance and logs
- Programming Language – Basic Understanding
- Basic programming concepts
- Using variables and simple operators
- Writing loops and if statements
- Creating and using functions
- JavaScript – Hands-on Practical
- Basic JavaScript syntax
- Changing web pages with JavaScript
- Writing basic programs in JavaScript
- Debugging JavaScript code
- Understanding Python – Practical
- Basic Python commands and concepts
- Using loops and if statements
- Writing functions
- Practical exercises in Python
- SQL – The Database (Practical Sessions)
- Introduction to databases
- Creating and altering tables
- Writing simple SQL queries
- Organizing data efficiently
- Basics of Networking
- Basic network concepts
- Understanding data transmission
- IP addresses and their functions
- Different network devices
- Switching and Routing Concepts
- Basics of switches and VLANs
- Fundamentals of switching
- Understanding routing basics
- LAB on routing
- Networking – LAB and Practical Sessions
- Introduction to networking
- VLAN configuration
- Network setup
- Basics of routing and switching
- Configuring a router
- Network Security Elements – Hands-on
- Fundamentals of network security
- Firewall basics
- Next-Generation Firewall concepts
- Introduction to Zscaler
- Importance of network security
- Configuring a Firewall, Router, and Switch
- Basic firewall setup
- Router access controls
- Switch and VLAN configuration
- Securing network devices
- Basic Concepts of Ethical Hacking – Hands-on LAB
- Introduction to ethical hacking
- Information gathering techniques
- Vulnerability scanning
- Security testing with permission
- Fundamentals of SIEM & SOC (Incident Response)
- Basics of SIEM and SOC
- Setting up SIEM tools
- Incident response strategies
- Real-life incident examples
- Real-Time Class on Governance, Risk, and Compliance
- Overview of security frameworks
- Risk assessment and management
- Compliance standards and practices
- Developing and adhering to security policies
- Summary and Conclusion – Special Session
- Review of key points
- Discussion on new security trends
- Interactive Q&A
- Best practices for continuous learning
What Will You Achieve?
Upon completing this course, you will be equipped to work independently as an SOC analyst in any organization.
How Will You Achieve This?
This course is structured to help you understand the real-time job role of a security analyst.
Why Choose Our Institute?
We are the only training institute in India offering real-time training in Cyber Security with real tools and techniques in a lab environment.
Note
- This training focuses on Ethical Hacking concepts to build a strong foundation.
- Emphasis is on becoming a ‘security analyst’ rather than on vendor-specific certifications.
- Separate real-time sessions on red team/threat hunting are available on demand.
- Our objective is to provide hands-on lab experience to prepare you as a cybersecurity professional, aligning with current market demands.