Cyber Security
- Online / In-person / Combination
- 4 Days a Week (2 Hrs per day)
Program Overview
About the Program
The rise across all types of industries. Professionals trained in cyber security possess the unique ability to protect digital assets and guard intellectual property. As one of the world’s fastest-growing technology fields, many experts see the cyber security job market doubling in the next five years – which means there will be a critical need for qualified individuals.
In partnership with Leadtecno school of continuing Studies, we are pleased to offer two stackable credentials in cyber security to deepen your understanding of cyber security topics, strengthen your skills as an IT manager or project lead and prepare you to advance your career in cyber security.
Upon completion of this program, you will have the competencies for the Advanced Cyber Security Certificates like CompTIA Security+, CISSP Associate, Certified Cybersecurity Technician (CCT), Microsoft Certified: Security, Compliance, and Identity Fundamentals, Advanced Cyber Security: SOC and Threat Intelligence Course, CISSP, GIAC Certified Incident Handler (GCIH),Certified Information Security Manager (CISM),EC-Council Certified SOC Analyst (CSA) Certified Ethical Hacker (CEH), GIAC Certified Threat Intelligence Analyst (GCTI), Splunk Core Certified User.
- Incident Management: Learn to handle and respond to security incidents effectively, from detection and assessment to containment and recovery, ensuring rapid and organized responses to minimize impact.
- SOC Analyst Training: Gain practical skills to monitor and secure IT infrastructures, detect threats, and provide real-time responses as a Security Operations Center (SOC) Analyst.
- Ethical Hacking: Master penetration testing and vulnerability assessment to understand cyber threats from an attacker’s perspective, with a strong focus on ethical practices and security improvement.
- Bug Bounty: Develop skills to identify, document, and report security vulnerabilities, helping organizations fortify their systems and rewarding you for discovering potential security weaknesses.
- Certified Cloud Security Specialist: Learn to secure cloud environments, manage cloud security risks, and ensure compliance with best practices, preparing you to protect data and applications in the cloud.
- Governance, Risk & Compliance (GRC): Understand the framework of policies, regulations, and compliance standards, enabling you to manage risk and align cybersecurity strategies with business objectives.
Potential Job Titles
- Application Security Administrator
- SOC Analyst
- Cyber Security Consultant
- Cyber Security Engineer
- Network Security Engineer
- Information Security Officer
- Security Assurance Engineer
- Cybersecurity Analyst
- Incident Management Specialist
- Security Support Specialist
- IT Support Specialist
- IT Support Specialist
- Threat Analyst
- Security Incident Responder
- Cyber Security Operations
- Penetration Tester
Recommended Certifications
- CompTIA Security+
- CISSP Associate
- Certified Cybersecurity Technician (CCT)
- Microsoft Certified: Security, Compliance, and Identity Fundamentals
Advanced Cyber Security: SOC and Threat Intelligence Course
- CISSP
- GIAC Certified Incident Handler (GCIH)
- Certified Information Security Manager (CISM)
- EC-Council Certified SOC Analyst (CSA)
- Certified Ethical Hacker (CEH)
- GIAC Certified Threat Intelligence Analyst (GCTI)
- Splunk Core Certified User
Level 1 Foundation Training
Introduction to Cyber Security
Lesson 1: Understanding Cyber Security
- Definition and Importance
- History of Cyber Security
- Overview of Current Cyber Threats
Lesson 2: Cyber Security Landscape
- Types of Cyber Attacks
- Notable Cyber Incidents
- Key Players in Cyber Security
Lesson 3: Basic Terminology and Concepts
- Confidentiality, Integrity, Availability (CIA Triad)
- Authentication, Authorization, and Accounting (AAA)
- Encryption and Decryption
Lesson 4: Threats, Vulnerabilities, and Risks
- Difference Between Threats, Vulnerabilities, and Risks
- Examples of Common Vulnerabilities
- Risk Management Fundamentals
Lesson 5: Networking Fundamentals
- OSI and TCP/IP Models
- IP Addressing and Subnetting
- Common Network Devices
Lesson 6: Network Security Principles
- Firewall Configurations and Types
- Network Segmentation and VLANs
- Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)
Lesson 7: Windows Security Basics
- User Account Management
- Security Policies and Group Policy Objects (GPOs)
- Windows Defender and Other Security Tools
Lesson 8: Linux Security Basics (4 hours)
- User and Permission Management
- Common Security Configurations
- Security Tools in Linux (iptables, SELinux, etc.)
Lesson 9: Malware
- Types of Malwares
- Detection and Prevention Techniques
Lesson 10: Phishing and Social Engineering
- Types of Phishing Attacks
- Social Engineering Techniques
- Defense Strategies
Lesson 11: Advanced Attack Vectors
- Man-in-the-Middle (MitM) Attacks
- SQL Injection and Web Application Attacks
- Zero-Day Exploits
Lesson 12: Security Tools Overview
- Anti-virus/Anti-malware Software
- Network Scanners (Nmap, Wireshark)
- Vulnerability Scanners (Nessus, OpenVAS)
Lesson 13: Penetration Testing Basics
- Penetration Testing Methodology
- Using Metasploit
- Practical Penetration Testing Scenarios
Lesson 14: Incident Response
- Incident Response Process and Planning
- Tools for Incident Response
- Case Study of a Cyber Incident
Lesson 15: Introduction to Cyber Security Policies
- Developing and Implementing Security Policies
- Examples of Common Security Policies
Lesson 16: Legal and Regulatory Compliance
- Key US/Canada Regulations (HIPAA, GDPR, CCPA, etc.)
- Understanding Compliance Requirements
- Case Studies on Compliance Failures
Lesson 17: Risk Management
- Risk Assessment Methodologies
- Risk Mitigation Strategies
- Continuous Monitoring and Improvement
Lesson 18: Building a Secure Environment
- Best Practices for Securing an organization
- Security Architecture and Design
- Regular Security Assessments
Lesson 19: Careers in Cyber Security
- Overview of Career Paths in Cyber Security
- Required Skills and Certifications
- Professional Development Resources
Lesson 20: Introduction to Cloud Security
- Cloud Security Fundamentals
- Securing Cloud Services
Lesson 21: Introduction to SOC
- Role and Function of a SOC
- SOC Tools and Technologies
Lesson 22: SOC Analyst Skills and Responsibilities
- Key Skills for SOC Analysts
- Incident Management in a SOC
Lesson 23: Splunk for Security Operations
- Introduction to Splunk
- Using Splunk for Incident Management
Lab 1: Network Configuration and Security
- Setting up a Secure Network Environment
- Configuring Firewalls and VLANs
Lab 2: Operating System Hardening
- Securing Windows and Linux Systems
- Implementing Security Policies
Lab 3: Simulated Attack and Defense Scenarios
- Penetration Testing Exercises
- Incident Response Simulations
- Final Project and Assessment (6 hours)
- Develop a Security Plan for a Hypothetical Organization
- Presenting and Defending the Plan
- Final Exam and Course Wrap-Up
- Comprehensive Exam Covering All Course Materials
- Review and Feedback Session
Level 2 Advanced Security Training
Advanced Cyber Security: SOC and Threat Intelligence
Lesson 1: Deep Dive into Cyber Security Principles (3 hours)
- Advanced Confidentiality, Integrity, Availability (CIA Triad)
- In-depth exploration of each principle.
- Application in real-world scenarios.
- Advanced Authentication, Authorization, and Accounting (AAA)
- Multi-factor authentication (MFA).
- Role-based access control (RBAC).
- Advanced Encryption Techniques
- Symmetric vs. asymmetric encryption.
- Public Key Infrastructure (PKI) and digital certificates.
Lesson 2: Advanced Threats, Vulnerabilities, and Risk Management (3 hours)
- Emerging Threats and Vulnerabilities
- Advanced Persistent Threats (APTs).
- Zero-day vulnerabilities.
- Advanced Risk Management Techniques
- Risk assessment frameworks (NIST, ISO/IEC 27005).
- Quantitative vs. qualitative risk assessment.
Lesson 3: SOC Architecture and Design (3 hours)
- Building a SOC
- Key components and architecture.
- Essential tools and technologies.
- SOC Models
- In-house vs. outsourced SOC.
- Hybrid SOC models.
Lesson 4: SOC Processes and Procedures (3 hours)
- Incident Detection and Response Workflow
- Incident detection, triage, and escalation.
- Post-incident analysis and reporting.
- SOC Best Practices
- Standard operating procedures (SOPs).
- Continuous improvement strategies.
Lesson 5: Threat Intelligence Integration in SOC (3 hours)
- Understanding Threat Intelligence
- Types and sources of threat intelligence.
- The intelligence lifecycle.
- Using Threat Intelligence in SOC
- Integration with SOC operations.
- Enhancing detection and response capabilities
Lesson 6: SOC Metrics and Performance Management (3 hours)
- Key Performance Indicators (KPIs) for SOC
- Incident response time.
- Detection accuracy.
- SOC Maturity Models
- Evaluating and improving SOC maturity.
- Capability Maturity Model Integration (CMMI) for SOC.
Lesson 7: Threat Intelligence Fundamentals (3 hours)
- Types of Threat Intelligence
- Tactical, operational, strategic, and technical intelligence.
- Sources of Threat Intelligence
- Open-source intelligence (OSINT).
- Commercial threat intelligence feeds.
Lesson 8: Threat Intelligence Collection and Analysis (3 hours)
- Collection Techniques
- Automated vs. manual collection methods.
- Tools and platforms for threat intelligence collection.
- Analysis Techniques
- Data correlation and enrichment.
- Threat modeling and analysis.
Lesson 9: Threat Intelligence Sharing and Collaboration (3 hours)
- Intelligence Sharing Frameworks
- Information Sharing and Analysis Centers (ISACs).
- Information Sharing and Analysis Organizations (ISAOs).
- Collaboration Tools and Platforms
- STIX/TAXII protocols.
- Trusted Automated eXchange of Indicator Information (TAXII).
Lesson 10: Threat Intelligence Case Studies (3 hours)
- Real-World Applications of Threat Intelligence
- Case studies on successful threat intelligence operations.
- Lessons Learned
- Analysis of past incidents and application of threat intelligence.
Lesson 11: Advanced Security Information and Event Management (SIEM) (4 hours)
- SIEM Architecture and Design
- Core components and architecture.
- Log collection, aggregation, and normalization.
- Advanced SIEM Use Cases
- Correlation rules and alerting.
- Threat hunting and anomaly detection using SIEM.
Lesson 12: Security Orchestration, Automation, and Response (SOAR) (3 hours)
- Introduction to SOAR
- Capabilities and benefits.
- SOAR in SOC Operations
- Automating incident response processes.
- Integration with other security tools.
Lesson 13: Advanced Incident Response (3 hours)
- Incident Response Planning and Preparation
- Developing and testing incident response plans.
- Roles and responsibilities in incident response.
- Advanced Incident Handling Techniques
- Forensic analysis and evidence collection.
- Incident containment, eradication, and recovery.
Lesson 14: Advanced Cyber Security Policies and Frameworks (3 hours)
- Developing Advanced Security Policies
- Policy lifecycle management.
- Examples of advanced security policies.
- Compliance Frameworks and Standards
- NIST Cybersecurity Framework.
- ISO/IEC 27001 and other relevant standards.
Lesson 15: Legal and Regulatory Requirements (3 hours)
- Advanced Regulatory Compliance
- Detailed overview of HIPAA, GDPR, CCPA, etc.
- Meeting compliance requirements and audits.
- Case Studies on Regulatory Compliance
- Analysis of compliance failures and consequences.
Lab 1: Advanced Network Security Configuration (3 hours)
- Configuring Advanced Firewall Settings
- Implementing advanced rules and policies.
- Setting Up Intrusion Detection and Prevention Systems
- Configuring and tuning IDS/IPS.
Lab 2: Advanced Operating System Hardening (3 hours)
- Hardening Techniques for Windows and Linux
- Implementing advanced security policies.
- Using security tools and scripts.
Lab 3: Threat Intelligence Analysis and Reporting (2 hours)
- Practical Threat Intelligence Analysis
- Using threat intelligence platforms.
- Creating and presenting threat intelligence reports.
- Final Project and Assessment (6 hours)
- Develop a Comprehensive Plan for SOC and Threat Intelligence Integration
- Design an integrated SOC and threat intelligence framework for a hypothetical organization.
- Presenting and Defending the Plan
- Presentation skills and defending your strategy.
- Comprehensive Exam Covering All Course Materials
- Testing knowledge and practical skills.
- Review and Feedback Session
- Discussing exam results and course feedback.
Learning Outcomes for Basic Course: Key Skills Gained
- Understand the basic concepts and importance of cyber security.
- Identify various types of cyber threats and attack vectors.
- Apply fundamental security measures to networks and operating systems.
- Utilize key security tools for monitoring and defending against cyber-attacks.
- Develop and implement basic security policies and procedures.
- Understand the roles and responsibilities within a Security Operations Center (SOC).
- Perform basic incident management and response.
- Integrate and utilize threat intelligence in SOC processes.
- Apply advanced security tools and techniques to protect networks and systems.
- Develop and implement advanced security policies and frameworks.
- Perform advanced incident response and forensic analysis
- Monitoring and Detection: Continuously monitor network traffic and security alerts for potential threats.
- Incident Response: Respond to and investigate security incidents, ensuring they are properly contained and mitigated.
- Threat Hunting: Proactively search for signs of malicious activities or vulnerabilities within the network.
- Forensic Analysis: Conduct forensic investigations to determine the cause and impact of security breaches.
- Incident Handling: Develop and execute strategies for containment, eradication, and recovery from security incidents.
- Post-Incident Review: Conduct post-incident reviews to identify lessons learned and improve incident response plans.