Cybersecurity Fundamentals
About Course
- Introduction to Cybersecurity, threat landscape, CIA triad
- Operating systems security: Windows, Linux, file permissions
- Networking basics: TCP/IP, ports, protocols
- Firewalls, IDS/IPS, perimeter securityMalware types: viruses
- , worms, trojans, ransomware
- Antivirus tools, sandboxing, endpoint protection
- Vulnerability scanning: Nessus, OpenVAS
- Penetration testing methodology, Kali Linux tools
- Web application security: OWASP Top 10
- Secure coding practices, input validation
- Cryptography: symmetric/asymmetric, hashing, PKI
- SSL/TLS, VPNs, secure communication protocols
- Identity & Access Management (IAM), MFA, SSO
- Cloud security fundamentals: AWS, Azure
- Security policies, risk management, threat modeling
- GDPR, ISO 27001, compliance frameworks
- Incident response planning, playbooks
- Digital forensics: evidence collection, chain of custody
- SIEM tools: Splunk, ELK Stack
- Security operations center (SOC) workflows
- Red team vs blue team exercises
- Cybersecurity career paths, certifications (CompTIA, CEH)
- Capstone project: full security audit simulation
- Interview prep, CV building, portfolio review
Course Content
Introduction to Cybersecurity, threat landscape, CIA triad
Operating systems security: Windows, Linux, file permissions
Student Ratings & Reviews
No Review Yet