LeadTecno

Cyber Security

About the Program

The rise across all types of industries. Professionals trained in cyber security possess the unique ability to protect digital assets and guard intellectual property. As one of the world’s fastest-growing technology fields, many experts see the cyber security job market doubling in the next five years – which means there will be a critical need for qualified individuals.
In partnership with Leadtecno school of continuing Studies, we are pleased to offer two stackable credentials in cyber security to deepen your understanding of cyber security topics, strengthen your skills as an IT manager or project lead and prepare you to advance your career in cyber security.
Upon completion of this program, you will have the competencies for the Advanced Cyber Security Certificates like CompTIA Security+, CISSP Associate, Certified Cybersecurity Technician (CCT), Microsoft Certified: Security, Compliance, and Identity Fundamentals, Advanced Cyber Security: SOC and Threat Intelligence Course, CISSP, GIAC Certified Incident Handler (GCIH),Certified Information Security Manager (CISM),EC-Council Certified SOC Analyst (CSA) Certified Ethical Hacker (CEH), GIAC Certified Threat Intelligence Analyst (GCTI), Splunk Core Certified User.

Potential Job Titles

Recommended Certifications

Advanced Cyber Security: SOC and Threat Intelligence Course

Level 1 Foundation Training

Introduction to Cyber Security

Lesson 1: Understanding Cyber Security

  1. Definition and Importance
  2. History of Cyber Security
  3. Overview of Current Cyber Threats

Lesson 2: Cyber Security Landscape

  1. Types of Cyber Attacks
  2. Notable Cyber Incidents
  3. Key Players in Cyber Security

Lesson 3: Basic Terminology and Concepts

  1. Confidentiality, Integrity, Availability (CIA Triad)
  2. Authentication, Authorization, and Accounting (AAA)
  3. Encryption and Decryption

Lesson 4: Threats, Vulnerabilities, and Risks

  1. Difference Between Threats, Vulnerabilities, and Risks
  2. Examples of Common Vulnerabilities
  3. Risk Management Fundamentals

Lesson 5: Networking Fundamentals

  1. OSI and TCP/IP Models
  2. IP Addressing and Subnetting
  3. Common Network Devices

Lesson 6: Network Security Principles

  1. Firewall Configurations and Types
  2. Network Segmentation and VLANs
  3. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)

Lesson 7: Windows Security Basics

  1. User Account Management
  2. Security Policies and Group Policy Objects (GPOs)
  3. Windows Defender and Other Security Tools

Lesson 8: Linux Security Basics (4 hours)

  1. User and Permission Management
  2. Common Security Configurations
  3. Security Tools in Linux (iptables, SELinux, etc.)

Lesson 9: Malware

  1. Types of Malwares
  2. Detection and Prevention Techniques

Lesson 10: Phishing and Social Engineering

  1. Types of Phishing Attacks
  2. Social Engineering Techniques
  3. Defense Strategies

Lesson 11: Advanced Attack Vectors

  1. Man-in-the-Middle (MitM) Attacks
  2. SQL Injection and Web Application Attacks
  3. Zero-Day Exploits

Lesson 12: Security Tools Overview

  1. Anti-virus/Anti-malware Software
  2. Network Scanners (Nmap, Wireshark)
  3. Vulnerability Scanners (Nessus, OpenVAS)

Lesson 13: Penetration Testing Basics

  1. Penetration Testing Methodology
  2. Using Metasploit
  3. Practical Penetration Testing Scenarios

Lesson 14: Incident Response

  1. Incident Response Process and Planning
  2. Tools for Incident Response
  3. Case Study of a Cyber Incident

Lesson 15: Introduction to Cyber Security Policies

  1. Developing and Implementing Security Policies
  2. Examples of Common Security Policies

Lesson 16: Legal and Regulatory Compliance

  1. Key US/Canada Regulations (HIPAA, GDPR, CCPA, etc.)
  2. Understanding Compliance Requirements
  3. Case Studies on Compliance Failures

Lesson 17: Risk Management

  1. Risk Assessment Methodologies
  2. Risk Mitigation Strategies
  3. Continuous Monitoring and Improvement

Lesson 18: Building a Secure Environment

  1. Best Practices for Securing an organization
  2. Security Architecture and Design
  3. Regular Security Assessments

Lesson 19: Careers in Cyber Security

  1. Overview of Career Paths in Cyber Security
  2. Required Skills and Certifications
  3. Professional Development Resources

Lesson 20: Introduction to Cloud Security

  1. Cloud Security Fundamentals
  2. Securing Cloud Services

Lesson 21: Introduction to SOC

  1. Role and Function of a SOC
  2. SOC Tools and Technologies

Lesson 22: SOC Analyst Skills and Responsibilities

  1. Key Skills for SOC Analysts
  2. Incident Management in a SOC

Lesson 23: Splunk for Security Operations

  1. Introduction to Splunk
  2. Using Splunk for Incident Management

Lab 1: Network Configuration and Security

  1. Setting up a Secure Network Environment
  2. Configuring Firewalls and VLANs

Lab 2: Operating System Hardening

  1. Securing Windows and Linux Systems
  2. Implementing Security Policies

Lab 3: Simulated Attack and Defense Scenarios

  1. Penetration Testing Exercises
  2. Incident Response Simulations
  3. Final Project and Assessment (6 hours)
  1. Develop a Security Plan for a Hypothetical Organization
  2. Presenting and Defending the Plan
  3. Final Exam and Course Wrap-Up
  4. Comprehensive Exam Covering All Course Materials
  5. Review and Feedback Session

Level 2 Advanced Security Training

Advanced Cyber Security: SOC and Threat Intelligence

Lesson 1: Deep Dive into Cyber Security Principles (3 hours)

  1. Advanced Confidentiality, Integrity, Availability (CIA Triad)
  2. In-depth exploration of each principle.
  3. Application in real-world scenarios.
  4. Advanced Authentication, Authorization, and Accounting (AAA)
  5. Multi-factor authentication (MFA).
  6. Role-based access control (RBAC).
  7. Advanced Encryption Techniques
  8. Symmetric vs. asymmetric encryption.
  9. Public Key Infrastructure (PKI) and digital certificates.

Lesson 2: Advanced Threats, Vulnerabilities, and Risk Management (3 hours)

  1. Emerging Threats and Vulnerabilities
  2. Advanced Persistent Threats (APTs).
  3. Zero-day vulnerabilities.
  4. Advanced Risk Management Techniques
  5. Risk assessment frameworks (NIST, ISO/IEC 27005).
  6. Quantitative vs. qualitative risk assessment.

Lesson 3: SOC Architecture and Design (3 hours)

  1. Building a SOC
  2. Key components and architecture.
  3. Essential tools and technologies.
  4. SOC Models
  5. In-house vs. outsourced SOC.
  6. Hybrid SOC models.

Lesson 4: SOC Processes and Procedures (3 hours)

  1. Incident Detection and Response Workflow
  2. Incident detection, triage, and escalation.
  3. Post-incident analysis and reporting.
  4. SOC Best Practices
  5. Standard operating procedures (SOPs).
  6. Continuous improvement strategies.

Lesson 5: Threat Intelligence Integration in SOC (3 hours)

  1. Understanding Threat Intelligence
  2. Types and sources of threat intelligence.
  3. The intelligence lifecycle.
  4. Using Threat Intelligence in SOC
  5. Integration with SOC operations.
  6. Enhancing detection and response capabilities

Lesson 6: SOC Metrics and Performance Management (3 hours)

  1. Key Performance Indicators (KPIs) for SOC
  2. Incident response time.
  3. Detection accuracy.
  4. SOC Maturity Models
  5. Evaluating and improving SOC maturity.
  6. Capability Maturity Model Integration (CMMI) for SOC.

Lesson 7: Threat Intelligence Fundamentals (3 hours)

  1. Types of Threat Intelligence
  2. Tactical, operational, strategic, and technical intelligence.
  3. Sources of Threat Intelligence
  4. Open-source intelligence (OSINT).
  5. Commercial threat intelligence feeds.

Lesson 8: Threat Intelligence Collection and Analysis (3 hours)

  1. Collection Techniques
  2. Automated vs. manual collection methods.
  3. Tools and platforms for threat intelligence collection.
  4. Analysis Techniques
  5. Data correlation and enrichment.
  6. Threat modeling and analysis.

Lesson 9: Threat Intelligence Sharing and Collaboration (3 hours)

  1. Intelligence Sharing Frameworks
  2. Information Sharing and Analysis Centers (ISACs).
  3. Information Sharing and Analysis Organizations (ISAOs).
  4. Collaboration Tools and Platforms
  5. STIX/TAXII protocols.
  6. Trusted Automated eXchange of Indicator Information (TAXII).

Lesson 10: Threat Intelligence Case Studies (3 hours)

  1. Real-World Applications of Threat Intelligence
  2. Case studies on successful threat intelligence operations.
  3. Lessons Learned
  4. Analysis of past incidents and application of threat intelligence.

Lesson 11: Advanced Security Information and Event Management (SIEM) (4 hours)

  1. SIEM Architecture and Design
  2. Core components and architecture.
  3. Log collection, aggregation, and normalization.
  4. Advanced SIEM Use Cases
  5. Correlation rules and alerting.
  6. Threat hunting and anomaly detection using SIEM.

Lesson 12: Security Orchestration, Automation, and Response (SOAR) (3 hours)

  1. Introduction to SOAR
  2. Capabilities and benefits.
  3. SOAR in SOC Operations
  4. Automating incident response processes.
  5. Integration with other security tools.

Lesson 13: Advanced Incident Response (3 hours)

  1. Incident Response Planning and Preparation
  2. Developing and testing incident response plans.
  3. Roles and responsibilities in incident response.
  4. Advanced Incident Handling Techniques
  5. Forensic analysis and evidence collection.
  6. Incident containment, eradication, and recovery.

Lesson 14: Advanced Cyber Security Policies and Frameworks (3 hours)

  1. Developing Advanced Security Policies
  2. Policy lifecycle management.
  3. Examples of advanced security policies.
  4. Compliance Frameworks and Standards
  5. NIST Cybersecurity Framework.
  6. ISO/IEC 27001 and other relevant standards.

Lesson 15: Legal and Regulatory Requirements (3 hours)

  1. Advanced Regulatory Compliance
  2. Detailed overview of HIPAA, GDPR, CCPA, etc.
  3. Meeting compliance requirements and audits.
  4. Case Studies on Regulatory Compliance
  5. Analysis of compliance failures and consequences.

Lab 1: Advanced Network Security Configuration (3 hours)

  1. Configuring Advanced Firewall Settings
  2. Implementing advanced rules and policies.
  3. Setting Up Intrusion Detection and Prevention Systems
  4. Configuring and tuning IDS/IPS.

Lab 2: Advanced Operating System Hardening (3 hours)

  1. Hardening Techniques for Windows and Linux
  2. Implementing advanced security policies.
  3. Using security tools and scripts.

Lab 3: Threat Intelligence Analysis and Reporting (2 hours)

  1. Practical Threat Intelligence Analysis
  2. Using threat intelligence platforms.
  3. Creating and presenting threat intelligence reports.
  4. Final Project and Assessment (6 hours)
  1. Develop a Comprehensive Plan for SOC and Threat Intelligence Integration
  2. Design an integrated SOC and threat intelligence framework for a hypothetical organization.
  3. Presenting and Defending the Plan
  4. Presentation skills and defending your strategy.
  1. Comprehensive Exam Covering All Course Materials
  2. Testing knowledge and practical skills.
  3. Review and Feedback Session
  4. Discussing exam results and course feedback.

Learning Outcomes for Basic Course: Key Skills Gained

Contact us for more details

Download our brochure to discover our course offerings and details