Professional Training Program
Cybersecurity Curriculum
Phase 1: Introduction to Cybersecurity
- Module 1: Introduction to Cybersecurity
- Module 2: Attacks, Concepts, and Techniques
- Module 3: Protecting Your Data and Privacy
- Module 4: Protecting the Organization
- Module 5: Career Pathways in Cybersecurity
Phase 2: Network Security
- Module 6: Cybersecurity Threats, Vulnerabilities, and Attacks
- Module 7: Securing Networks
- Module 8: Attacking the Foundation
- Module 9: Attacking What We Do
- Module 10: Wireless Network Communication
- Module 11: Network Security Infrastructure
-
Checkpoint Examination: Network Security
Phase 3: Operating Systems & Endpoint Security
- Module 12: Windows Operating System
- Module 13: Linux Overview
- Module 14: System and Endpoint Protection
-
Checkpoint Examination: OS and Endpoint Security
Phase 4: Defense, Firewalls & Cloud Security
- Module 15: Cybersecurity Principles, Practices, and Processes
- Module 16: Understanding Defense
- Module 17: System and Network Defense
- Module 18: Access Control
- Module 19: Access Control Lists
- Module 20: Firewall Technologies
- Module 21: Zone-Based Policy Firewalls
- Module 22: Cloud Security
- Module 23: Cryptography
-
Checkpoint Examination: Firewalls, Cryptography, and Cloud Security
Phase 5: Security Operations, Risk Management & Incident Response
- Module 24: Technologies and Protocols
- Module 25: Network Security Data
- Module 26: Evaluating Alerts
- Module 27: Governance and Compliance
- Module 28: Network Security Testing
- Module 29: Threat Intelligence
- Module 30: Endpoint Vulnerability Assessment
- Module 31: Risk Management and Security Controls
- Module 32: Digital Forensics and Incident Analysis & Response
-
Final Checkpoint Examination