Cyber Security
About the Program
The rise across all types of industries. Professionals trained in cyber security possess the unique ability to protect digital assets and guard intellectual property. As one of the world’s fastest-growing technology fields, many experts see the cyber security job market doubling in the next five years – which means there will be a critical need for qualified individuals.
In partnership with Leadtecno school of continuing Studies, we are pleased to offer two stackable credentials in cyber security to deepen your understanding of cyber security topics, strengthen your skills as an IT manager or project lead and prepare you to advance your career in cyber security.
Upon completion of this program, you will have the competencies for the Advanced Cyber Security Certificates like CompTIA Security+, CISSP Associate, Certified Cybersecurity Technician (CCT), Microsoft Certified: Security, Compliance, and Identity Fundamentals, Advanced Cyber Security: SOC and Threat Intelligence Course, CISSP, GIAC Certified Incident Handler (GCIH),Certified Information Security Manager (CISM),EC-Council Certified SOC Analyst (CSA) Certified Ethical Hacker (CEH), GIAC Certified Threat Intelligence Analyst (GCTI), Splunk Core Certified User.
- Incident Management: Learn to handle and respond to security incidents effectively, from detection and assessment to containment and recovery, ensuring rapid and organized responses to minimize impact.
- SOC Analyst Training: Gain practical skills to monitor and secure IT infrastructures, detect threats, and provide real-time responses as a Security Operations Center (SOC) Analyst
- Ethical Hacking: Master penetration testing and vulnerability assessment to understand cyber threats from an attacker’s perspective, with a strong focus on ethical practices and security improvement.
- Bug Bounty: Develop skills to identify, document, and report security vulnerabilities, helping organizations fortify their systems and rewarding you for discovering potential security weaknesses.
- Certified Cloud Security Specialist: Learn to secure cloud environments, manage cloud security risks, and ensure compliance with best practices, preparing you to protect data and applications in the cloud.
- Governance, Risk & Compliance (GRC): Understand the framework of policies, regulations, and compliance standards, enabling you to manage risk and align cybersecurity strategies with business objectives.
Potential Job Titles
- Application Security Administrator
- SOC Analyst
- Cyber Security Consultant
- Cyber Security Engineer
- Network Security Engineer
- Information Security Officer
- Security Assurance Engineer
- Cybersecurity Analyst
- Incident Management Specialist
- Security Support Specialist
- IT Support Specialist
- Threat Analyst
- Security Incident Responder
- Cyber Security Operations
- Penetration Tester
Recommended Certifications
- CompTIA Security+
- CISSP Associate
- Certified Cybersecurity Technician (CCT)
- Microsoft Certified: Security, Compliance, and Identity Fundamentals
Advanced Cyber Security: SOC and Threat Intelligence Course
- CISSP
- GIAC Certified Incident Handler (GCIH)
- Certified Information Security Manager (CISM)
- EC-Council Certified SOC Analyst (CSA)
- Certified Ethical Hacker (CEH)
- GIAC Certified Threat Intelligence Analyst (GCTI)
- Splunk Core Certified User
Level 1 Foundation Training
Introduction to Cyber Security
Module 1: Introduction to Cyber Security (2 hours)
Lesson 1: Understanding Cyber Security
- Definition and Importance
- History of Cyber Security
- Overview of Current Cyber Threats
Lesson 2: Cyber Security Landscape
- Types of Cyber Attacks
- Notable Cyber Incidents
- Key Players in Cyber Security
Module 2: Fundamental Concepts of Cyber Security (2 hours)
lesson 3: Basic Terminology and Concepts
- Confidentiality, Integrity, Availability (CIA Triad)
- Authentication, Authorization, and Accounting (AAA)
- Encryption and Decryption
Lesson 4: Threats, Vulnerabilities, and Risks
- Difference Between Threats, Vulnerabilities, and Risks
- Examples of Common Vulnerabilities
- Risk Management Fundamentals
Module 3: Networking Basics for Cyber Security (8 hours)
Lesson 5: Networking Fundamentals
- OSI and TCP/IP Models
- IP Addressing and Subnetting
- Common Network Devices
Lesson 6: Network Security Principles
- Firewall Configurations and Types
- Network Segmentation and VLANs
- Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)
Module 4: Operating System Security (8 hours)
Lesson 7: Windows Security Basics
- User Account Management
- Security Policies and Group Policy Objects (GPOs)
- Windows Defender and Other Security Tools
Lesson 8: Linux Security Basics (4 hours)
- User and Permission Management
- Common Security Configurations
- Security Tools in Linux (iptables, SELinux, etc.)
Module 5: Cyber Threats and Attack Vectors (10 hours)
Lesson 9: Malware
- Types of Malwares
- Detection and Prevention Techniques
Lesson 10: Phishing and Social Engineering
- Types of Phishing Attacks
- Social Engineering Techniques
- Defense Strategies
Lesson 11: Advanced Attack Vectors
- Man-in-the-Middle (MitM) Attacks
- SQL Injection and Web Application Attacks
- Zero-Day Exploits
Module 6: Cyber Security Tools and Techniques (8 hours)
Lesson 12: Security Tools Overview
- Anti-virus/Anti-malware Software
- Network Scanners (Nmap, Wireshark)
- Vulnerability Scanners (Nessus, OpenVAS)
Lesson 13: Penetration Testing Basics
- Penetration Testing Methodology
- Using Metasploit
- Practical Penetration Testing Scenarios
Lesson 14: Incident Response
- Incident Response Process and Planning
- Tools for Incident Response
- Case Study of a Cyber Incident
Module 7: Governance, Risk, and Compliance (3 hours)
Lesson 15: Introduction to Cyber Security Policies
- Developing and Implementing Security Policies
- Examples of Common Security Policies
Lesson 16: Legal and Regulatory Compliance
- Key US/Canada Regulations (HIPAA, GDPR, CCPA, etc.)
- Understanding Compliance Requirements
- Case Studies on Compliance Failures
Lesson 17: Risk Management
- Risk Assessment Methodologies
- Risk Mitigation Strategies
- Continuous Monitoring and Improvement
Module 8: Cyber Security in Practice (3 hours)
Lesson 18: Building a Secure Environment
- Best Practices for Securing an organization
- Security Architecture and Design
- Regular Security Assessments
Lesson 19: Careers in Cyber Security
- Overview of Career Paths in Cyber Security
- Required Skills and Certifications
- Professional Development Resources
Lesson 20: Introduction to Cloud Security
- Cloud Security Fundamentals
- Securing Cloud Services
Module 9: Security Operations Center (SOC) and Incident Management (6 hours)
Lesson 21: Introduction to SOC
- Role and Function of a SOC
- SOC Tools and Technologies
Lesson 22: SOC Analyst Skills and Responsibilities
- Key Skills for SOC Analysts
- Incident Management in a SOC
Lesson 23: Splunk for Security Operations
- Introduction to Splunk
- Using Splunk for Incident Management
Module 10: Hands-On Labs and Projects (10 hours)
Lab 1: Network Configuration and Security
- Setting up a Secure Network Environment
- Configuring Firewalls and VLANs
Lab 2: Operating System Hardening
- Securing Windows and Linux Systems
- Implementing Security Policies
Lab 3: Simulated Attack and Defense Scenarios
- Penetration Testing Exercises
- Incident Response Simulations
- Final Project and Assessment (6 hours)
Project: Comprehensive Security Plan
- Develop a Security Plan for a Hypothetical Organization
- Presenting and Defending the Plan
- Final Exam and Course Wrap-Up
- Comprehensive Exam Covering All Course Materials
- Review and Feedback Session
Level 2 Advanced Security Training
Advanced Cyber Security: SOC and Threat Intelligence
Module 1: Advanced Cyber Security Concepts (6 hours)
Lesson 1: Deep Dive into Cyber Security Principles (3 hours)
- Advanced Confidentiality, Integrity, Availability (CIA Triad)
- In-depth exploration of each principle.
- Application in real-world scenarios.
- Advanced Authentication, Authorization, and Accounting (AAA)
- Multi-factor authentication (MFA).
- Role-based access control (RBAC).
- Advanced Encryption Techniques
- Symmetric vs. asymmetric encryption.
- Public Key Infrastructure (PKI) and digital certificates.
Lesson 2: Advanced Threats, Vulnerabilities, and Risk Management (3 hours)
- Emerging Threats and Vulnerabilities
- Advanced Persistent Threats (APTs).
- Zero-day vulnerabilities.
- Advanced Risk Management Techniques
- Risk assessment frameworks (NIST, ISO/IEC 27005).
- Quantitative vs. qualitative risk assessment.
Module 2: SOC Operations and Management (12 hours)
Lesson 3: SOC Architecture and Design (3 hours)
- Building a SOC
- Key components and architecture.
- Essential tools and technologies.
- SOC Models
- In-house vs. outsourced SOC.
- Hybrid SOC models.
Lesson 4: SOC Processes and Procedures (3 hours)
- Incident Detection and Response Workflow
- Incident detection, triage, and escalation.
- Post-incident analysis and reporting.
- SOC Best Practices
- Standard operating procedures (SOPs).
- Continuous improvement strategies.
Lesson 5: Threat Intelligence Integration in SOC (3 hours)
- Understanding Threat Intelligence
- Types and sources of threat intelligence.
- The intelligence lifecycle.
- Using Threat Intelligence in SOC
- Integration with SOC operations.
- Enhancing detection and response capabilities
Lesson 6: SOC Metrics and Performance Management (3 hours)
- Key Performance Indicators (KPIs) for SOC
- Incident response time.
- Detection accuracy.
- SOC Maturity Models
- Evaluating and improving SOC maturity.
- Capability Maturity Model Integration (CMMI) for SOC.
Module 3: Advanced Threat Intelligence (12 hours)
Lesson 7: Threat Intelligence Fundamentals (3 hours)
- Types of Threat Intelligence
- Tactical, operational, strategic, and technical intelligence.
- Sources of Threat Intelligence
- Open-source intelligence (OSINT).
- Commercial threat intelligence feeds.
Lesson 8: Threat Intelligence Collection and Analysis (3 hours)
- Collection Techniques
- Automated vs. manual collection methods.
- Tools and platforms for threat intelligence collection.
- Analysis Techniques
- Data correlation and enrichment.
- Threat modeling and analysis.
Lesson 9: Threat Intelligence Sharing and Collaboration (3 hours)
- Intelligence Sharing Frameworks
- Information Sharing and Analysis Centers (ISACs).
- Information Sharing and Analysis Organizations (ISAOs).
- Collaboration Tools and Platforms
- STIX/TAXII protocols.
- Trusted Automated eXchange of Indicator Information (TAXII).
Lesson 10: Threat Intelligence Case Studies (3 hours)
- Real-World Applications of Threat Intelligence
- Case studies on successful threat intelligence operations.
- Lessons Learned
- Analysis of past incidents and application of threat intelligence.
Module 3: Advanced Threat Intelligence (12 hours)
Lesson 11: Advanced Security Information and Event Management (SIEM) (4 hours)
- SIEM Architecture and Design
- Core components and architecture.
- Log collection, aggregation, and normalization.
- Advanced SIEM Use Cases
- Correlation rules and alerting.
- Threat hunting and anomaly detection using SIEM.
Lesson 12: Security Orchestration, Automation, and Response (SOAR) (3 hours)
- Introduction to SOAR
- Capabilities and benefits.
- SOAR in SOC Operations
- Automating incident response processes.
- Integration with other security tools.
Lesson 13: Advanced Incident Response (3 hours)
- Incident Response Planning and Preparation
- Developing and testing incident response plans.
- Roles and responsibilities in incident response.
- Advanced Incident Handling Techniques
- Forensic analysis and evidence collection.
- Incident containment, eradication, and recovery.
Module 5: Cyber Security Governance and Compliance (6 hours)
Lesson 14: Advanced Cyber Security Policies and Frameworks (3 hours)
- Developing Advanced Security Policies
- Policy lifecycle management.
- Examples of advanced security policies.
- Compliance Frameworks and Standards
- NIST Cybersecurity Framework.
- ISO/IEC 27001 and other relevant standards.
Lesson 15: Legal and Regulatory Requirements (3 hours)
- Advanced Regulatory Compliance
- Detailed overview of HIPAA, GDPR, CCPA, etc.
- Meeting compliance requirements and audits.
- Case Studies on Regulatory Compliance
- Analysis of compliance failures and consequences.
Module 6: Hands-On Labs and Projects (8 hours)
Lab 1: Advanced Network Security Configuration (3 hours)
- Configuring Advanced Firewall Settings
- Implementing advanced rules and policies.
- Setting Up Intrusion Detection and Prevention Systems
- Configuring and tuning IDS/IPS.
Lab 2: Advanced Operating System Hardening (3 hours)
- Hardening Techniques for Windows and Linux
- Implementing advanced security policies.
- Using security tools and scripts.
Lab 3: Threat Intelligence Analysis and Reporting (2 hours)
- Practical Threat Intelligence Analysis
- Using threat intelligence platforms.
- Creating and presenting threat intelligence reports.
- Final Project and Assessment (6 hours)
Project: SOC and Threat Intelligence Integration Plan (4 hours)
- Develop a Comprehensive Plan for SOC and Threat Intelligence Integration
- Design an integrated SOC and threat intelligence framework for a hypothetical organization.
- Presenting and Defending the Plan
- Presentation skills and defending your strategy.
Final Exam and Course Wrap-Up (2 hours)
- Comprehensive Exam Covering All Course Materials
- Testing knowledge and practical skills.
- Review and Feedback Session
- Discussing exam results and course feedback.
Learning Outcomes for Basic Course: Key Skills Gained
- Understand the basic concepts and importance of cyber security.
- Identify various types of cyber threats and attack vectors.
- Apply fundamental security measures to networks and operating systems.
- Utilize key security tools for monitoring and defending against cyber-attacks.
- Develop and implement basic security policies and procedures.
- Understand the roles and responsibilities within a Security Operations Center (SOC).
- Perform basic incident management and response.
- Integrate and utilize threat intelligence in SOC processes.
- Apply advanced security tools and techniques to protect networks and systems.
- Develop and implement advanced security policies and frameworks.
- Perform advanced incident response and forensic analysis
- Monitoring and Detection: Continuously monitor network traffic and security alerts for potential threats.
- Incident Response: Respond to and investigate security incidents, ensuring they are properly contained and mitigated.
- Threat Hunting: Proactively search for signs of malicious activities or vulnerabilities within the network.
- Forensic Analysis: Conduct forensic investigations to determine the cause and impact of security breaches.
- Incident Handling: Develop and execute strategies for containment, eradication, and recovery from security incidents.
- Post-Incident Review: Conduct post-incident reviews to identify lessons learned and improve incident response plans.
Other Courses
ServiceNow IT- Business Analyst
Use ServiceNow to design workflows and manage IT systems as a business analyst
What Our Student's says
Vidhya Vijayann2025-09-11Trustindex verifies that the original source of the review is Google. i joined Leadtecno to pursue ServiceNow training and completed my CSA certification. Later, I was encouraged to explore the ServiceNow Business Analyst track, which turned out to be a life-changing decision. Thanks to their guidance, I received 20–30 calls from recruiters, got shortlisted, and attended around 15–18 interviews. From these, I was able to secure 3 job offers and had the privilege of choosing the one that best suited my location and benefits at this present market situation. This achievement would not have been possible without the continuous support and mentorship of Sudhish and team, who guided me patiently, clarified my doubts at any time, and motivated me whenever I felt low. I am truly grateful for his mentorship and highly recommend LeadTecno for anyone aspiring to build a strong career in ServiceNow. -Vidhya Vijaya Nirmala Gopal2025-09-06Trustindex verifies that the original source of the review is Google. Highly professional and healthy environment !! I am grateful for the concern for their services and support extended 👏wishing luck and thank you 👍🏻🙌🏻 Rakhee Chadha2025-07-26Trustindex verifies that the original source of the review is Google. I can't say enough good things about Leadtecno. Calling it just "IT training" doesn't do it justice. My time here has completely turned my career around, and I owe a huge thank you to the whole team, and especially to the person leading it all. Honestly, before I found Leadtecno, I was feeling pretty lost. I knew I wanted a career in IT, but I had no real map to get there. From my very first conversation with them, I could tell this place was different. The founder of the company is incredible – you can just feel their passion for helping people succeed. They actually took the time to listen to my goals and made me feel like they were personally invested in my journey. It wasn't like being just another number in a class; it felt like joining a community that genuinely wanted to see me win. The training itself (I took Business Analyst and ServiceNow) was fantastic. It wasn't dry textbook theory. Everything was hands-on and focused on the skills that companies are actually looking for right now. The instructors were the real deal—people who have actually worked in the field and know what they're talking about. They were always patient and would stick around to make sure you really got it, which made all the difference. But the thing that truly makes Leadtecno special is the mentorship. It goes way beyond the curriculum. The guidance I received, straight from the top, helped me figure out not just what I wanted to do, but who I wanted to be as a professional. I walked out of there with the right skills, sure, but more importantly, I left with the confidence to actually go out and use them. You can't put a price on that. If you're on the fence about starting a career in IT, I honestly can't recommend Leadtecno enough. They are the real deal. To the founder and the entire team: thank you. You didn't just help me find a job; you helped me build a future. Ashish Saxena2025-07-25Trustindex verifies that the original source of the review is Google. I would like to sincerely thank Leadtecno Consulting for their exceptional support in employment services and career guidance. Their team’s professionalism, prompt assistance, and personalized approach made the entire process smooth and rewarding. A special thanks to Mr. Sudish, whose dedication, timely communication, and genuine commitment were truly commendable. His support played a crucial role in my successful placement. Leadtecno stands out as a trusted and reliable partner in professional growth. I highly recommend their services to anyone seeking quality career support. Great work Sudish and I would like to work again with you in near future assignments 👍👍 Babita Jain2025-05-30Trustindex verifies that the original source of the review is Google. Working with Sudish and the team at Lead Techno has been a truly rewarding experience. Sudish brings a high level of professionalism and deep technical knowledge, and it’s clear he’s genuinely committed to helping his students succeed. The team is prompt, supportive, and always willing to go the extra mile to ensure a smooth and effective learning journey. Their expertise and dedication make a real difference. I highly recommend Lead Techno to anyone looking to build their skills and take the next step in their career. Karan Raghav2025-05-18Trustindex verifies that the original source of the review is Google. I've had a fantastic experience working with Sudish and the team at Lead Techno. Sudish is extremely professional, knowledgeable, and genuinely committed to delivering the best solutions for his students.The team is efficient, responsive, and goes above and beyond to ensure customer satisfaction. Whether it's technical expertise or timely support. Highly recommend their services to anyone looking to uplift their career. Sridhar Ilango2025-04-01Trustindex verifies that the original source of the review is Google. Hi Sudish, I sincerely appreciate your valuable guidance and expertise throughout the Business Analyst training. Your structured approach, in-depth knowledge, and dedication are truly commendable. The insights and skills I have gained through this training have been transformative. Thank you for your support and for making this learning experience so impactful !!! rogers abraham2025-03-28Trustindex verifies that the original source of the review is Google. Wonderful experience that yielded a six figure IT role. Mr anand aided throughout the entire process of getting a job, from field prep with classes and tutors to resume to linkedin to interview prep and reference management. Shalini2025-03-26Trustindex verifies that the original source of the review is Google. Leadtechno is an awesome training and placement service. Sudhish was my instructor in 2024. One of the key aspects that set Sudish apart is his ability to relate theoretical concepts to real-world scenarios. Throughout the course, he provided us with practical, real-time examples that helped us understand complex topics with ease. Instead of just focusing on textbook definitions, he walked us through real industry challenges, explaining how a Business Analyst should approach and resolve them effectively. His structured approach to teaching ensures that every key concept is covered in a way that is easy to grasp. He focuses on what truly matters in a BA’s career—covering essential methodologies, documentation practices, stakeholder communication, requirement gathering, and process modeling, among other critical topics. The course content was precise, industry-relevant, and designed to prepare us for real-world BA roles. I encourage to join here for upgrading skills deep knowledge and receive a good placement too! Balakrishnan Easwaran2025-03-06Trustindex verifies that the original source of the review is Google. I want to express my sincere gratitude to Mr. Sudhish for his wonderful guidance, motivation and support for my licensing exam. His dedication and genuine intention to help support me and my fellow learners is highly commendable. It's rare to come across such individual/consultancy that is this committed towards the success of their mentees/students like Sudish ji and company. It was very comfortable to ask him any questions that I have in mind, and get clarity without the fear of judgement. I look forward to have a life time of relationship with Sudish ji in every step of my career. Highly highly recommended.
Frequently Asked Questions
Before you dive in, let’s clear up the things you’re probably wondering about.
Will I get a certificate?
Yes! Every student who completes their program will receive a professional certificate, perfect for your resume, portfolio, or LinkedIn.
What if I miss a session?
Life happens — we get it. That’s why every session is recorded and uploaded so you can catch up at your own pace.
How long do I have access?
Once enrolled, you’ll have lifetime access to course content, resources, and future updates — no extra cost.
Do you help with jobs?
Can I talk to someone before enrolling?
Yes! You can book a free 15-minute career call with one of our advisors. We’ll help you find the path that fits you best.
Ready to Upskill or Hire Talent?
Ready to make waves in your industry? Let’s craft your success story together. Reach out now and let’s get started.

Have Questions? Let’s Chat!
Whether you’re unsure about the right course or just want to learn more, we’re here to help.
- 5016, 4th Ave North West, Edmonton Alberta, T6X 1A4, Canada
- 1191, Ellesmere Rd, Toronto Ontario, M1P 2X6, Canada
- +16472210315
- Support.edu@leadtecno.com