Comprehensive Cybersecurity Training
- Description
- Curriculum
- Reviews
- Grade
This cybersecurity course provides a comprehensive introduction to protecting systems, networks, data, and cloud environments in today’s threat landscape. Students will learn core security principles, networking and architecture fundamentals, identity and access management, cryptography, endpoint and cloud security, vulnerability management, threat detection, incident response, governance, risk, and compliance. The course also covers real-world threats such as malware, network and application attacks, social engineering, and insider risks, along with data protection, resiliency, and physical security concepts. In addition to theory, the course includes hands-on practical labs ensuring students gain practical, entry-level cybersecurity skills.
What you will learn:
-
Security fundamentals: Core principles like CIA triad, access control, governance, and compliance.
-
Networking basics: How networks work, including protocols, ports, services, and attacks.
-
Secure architecture: Designing secure on-prem, cloud, hybrid, and zero-trust environments.
-
Endpoint security: Hardening, protecting, and securely configuring devices and mobiles.
-
Identity and access management: Authentication, authorization, MFA, SSO, and privilege control.
-
Cryptography: Using encryption, hashing, certificates, and key management correctly.
-
Threats and risks: Understanding threat actors, attack vectors, social engineering, and risk.
-
Vulnerability management: Finding, analyzing, and fixing security weaknesses.
-
Threat detection: Identifying malware, indicators of compromise, and malicious behavior.
-
Data and asset protection: Data classification, backups, DLP, and secure destruction.
-
Physical security: Protecting facilities, hardware, and critical infrastructure.
-
Incident response: Detecting, containing, recovering from incidents, and handling evidence.
-
Security mindset: Analytical thinking, ethical judgment, and real-world problem solving.
Learning outcome:
By the end of this course, students will understand:
-
Fundamental cybersecurity principles, security models, and core security concepts
-
Networking fundamentals, ports, services, and common network attacks
-
Network, endpoint, and cloud security controls and how they are applied
-
Identity and access management concepts including authentication, authorization, and least privilege
-
Cryptography concepts for protecting data in transit, at rest, and in use
-
Threats, vulnerabilities, and risks, including social engineering techniques
-
Vulnerability scanning, analysis, and remediation processes
-
Indicators of compromise, logs, and signs of malicious activity
-
Malware types, attack techniques, and defensive strategies
-
Incident response concepts from detection through recovery and reporting
-
Security governance, risk management, compliance, and policy frameworks
-
Data protection concepts including classification, encryption, backups, and loss prevention
-
Resiliency, availability, and secure architecture principles
-
Practical cybersecurity workflows through hands-on labs and real-world security scenarios
-
1Week 1.0 Fundamental Security ConceptsPreview 3m
-
2Week 1.1 Introduction to the world of cybersecurityText lesson
-
3Week 1.2 Cybersecurity and CIA TriadText lesson
-
4Week 1.3 Gap AnalysisText lesson
-
5Week 1.4 Access ControlText lesson
-
6Week 1.5 Information Security CompetenciesText lesson
-
7Week 1.6 Information Security Roles and ResponsibilitiesText lesson
-
8Week 1.7 Information Security Business UnitsText lesson
-
9Week 1.8 Security Controls CategoriesText lesson
-
10Week 1.9 Security Control Functional TypesText lesson
-
11Week 1.10 Introduction to Kali LinuxText lesson
-
12Fundamental Security Concepts: Quiz 120 questions
-
13Week 1 CheckpointText lesson
-
14Week 2.0 NetworkingPreview 3m
Description:
Networking is the process of connecting computers, servers, devices, and systems in order to enable communication and information sharing. It requires making use of hardware, such as switches and routers, as well as protocols that specify clearly how data is transferred between local or global environments. Networking enables everything from simple file sharing to complex cloud services by allowing devices to exchange data reliably and efficiently. It forms the backbone of modern IT infrastructure, making communication, collaboration, and access to digital resources possible.
-
15Week 2.1 Networking FundamentalsText lesson
-
16Week 2.2 Network TopologiesText lesson
-
17Week 2.3 OSI MODELText lesson
-
18Week 2.4 IP ADDRESSING BASICSText lesson
-
19Week 2.5 SUBNETTINGText lesson
-
20Networking I Quiz20 questions
-
21Week 3.0 Networking IIPreview 3m
Description:
Networking is the foundation of how systems communicate, enabling devices, applications, and services to exchange data across local and global environments. In cybersecurity, networking involves understanding how information flows so defenders can detect weaknesses and protect infrastructure. This includes recognizing exposed systems through network reconnaissance, identifying open ports and running services, and understanding how attackers exploit these entry points. It also covers common network attacks such as spoofing, scanning, denial-of-service, and session hijacking. Networking includes the applications that rely on these connections web services, email, DNS, file transfer and the tools used to analyze traffic for threats, such as packet analyzers, intrusion detection systems, and log analysis platforms. Together, these elements help organizations secure their environments, detect malicious activity, and maintain strong network defenses.
-
22Week 3.1 PORTS AND SERVICESText lesson
-
23Week 3.2 Networking AppliancesText lesson
-
24Week 3.3 Network ReconnaissanceText lesson
-
25Week 3.4 Network AnalysisText lesson
-
26Week 3.5 Network AttacksText lesson
-
27Networking II Quiz20 questions
-
28Week 3 CheckpointText lesson
-
29Week 4.0 Evaluate Network Security Capabilities, Active defense and Secure CommunicationPreview 3m
Description:
Evaluating network security capabilities involves reviewing how well an organization’s network can prevent, detect, and respond to threats. This includes assessing firewalls, intrusion detection and prevention systems, access controls, and monitoring tools. Active defense takes this a step further by using proactive measures such as deception technologies, threat hunting, automated responses, and behavioral analysis to stop attackers in real time. Secure communication focuses on protecting data as it travels across networks by using encryption, secure protocols, and authentication mechanisms to ensure confidentiality, integrity, and authenticity. Together, these practices strengthen an organization’s ability to defend against modern cyber threats and maintain trusted communication channels.
-
30Week 4.1 Active DefenceText lesson
-
31Week 4.2 FirewallText lesson
-
32Week 4.3 IDS (Intrusion detection system)Text lesson
-
33Week 4.4 Intrusion Prevention System (IPS)Text lesson
-
34Week 4.5 SIEM (Security Information and Event Management)Text lesson
-
35Week 4.6 Benchmarks and secure configuration guidesText lesson
-
36Week 4.7 Wireless Network Installation ConsiderationsText lesson
-
37Week 4.8 Wireless EncryptionText lesson
-
38Week 4.9 Wi-Fi Authentication MethodsText lesson
-
39Week 4.10 Network Access Control (NAC)Text lesson
-
40Week 4.11 Access Control Lists (ACLs)Text lesson
-
41Week 4.12 Web FilteringText lesson
-
42Week 4.13 Load BalancersText lesson
-
43Week 4.14 Deception TechniquesText lesson
-
44Week 4.15 Secure CommunicationText lesson
-
45Evaluate Network Security Quiz10 questions
-
46Week 5.0 Assess Endpoint Security CapabilitiesPreview 3m
Description:
Assessing endpoint security capabilities involves evaluating how well devices such as laptops, servers, mobile phones, and workstations are protected against cyber threats. This includes reviewing antivirus and EDR solutions, patch management, device hardening, encryption, access controls, and monitoring tools. The goal is to ensure endpoints can prevent, detect, and respond to malware, unauthorized access, and exploitation attempts, since they are often the first targets in an attack. Effective endpoint security strengthens the overall security posture of the organization
-
47Week 5.1 Implement Endpoint SecurityText lesson
-
48Week 5.2 Endpoint ProtectionText lesson
-
49Week 5.3 Advanced Endpoint ProtectionText lesson
-
50Week 5.4 Endpoint ConfigurationText lesson
-
51Week 5.5 Hardening TechniquesText lesson
-
52Week 5.6 Hardening Specialized DevicesText lesson
-
53Week 5.7 Mobile Hardening TechniquesText lesson
-
54Week 5.8 Full Device Encryption and External MediaText lesson
-
55Week 5.9 Location ServicesText lesson
-
56Week 5.10 Cellular and GPS Connection MethodsText lesson
-
57Week 5.11 Wi-Fi and Tethering Connection MethodsText lesson
-
58Week 5.13 Bluetooth Connection MethodsText lesson
-
59Week 5.14 Near-Field Communications and Mobile Payment ServicesText lesson
-
60Assess Endpoint Security Quiz10 questions
-
61Week 5 CheckpointText lesson
-
62Week 6.0 Implement Identity and Access ManagementPreview 3m
Description:
Implementing Identity and Access Management (IAM) involves establishing processes and technologies that guarantee that systems, apps, and data are accessible only to the right people. This includes user authentication, authorization, account provisioning, role-based access, MFA, and periodic access reviews. The goal is to prevent unauthorized access, reduce insider threats, and enforce least-privilege principles across the organization, ensuring that only verified, approved users can perform allowed actions.
-
63Week 6.1 Authentication DesignText lesson
-
64Week 6.2 Password ConceptsText lesson
-
65Week 6.3 Password ManagersText lesson
-
66Week 6.4 Multifactor AuthenticationText lesson
-
67Week 6.5 Biometric AuthenticationText lesson
-
68Week 6.6 Hard Authentication TokensText lesson
-
69Week 6.8 Passwordless AuthenticationText lesson
-
70Week 6.9 AuthorizationText lesson
-
71Week 6.10 Least Privilege Permission AssignmentsText lesson
-
72Week 6.11 User Account ProvisioningText lesson
-
73Week 6.12 Account Attributes and Access PoliciesText lesson
-
74Week 6.13 Account RestrictionsText lesson
-
75Week 6.14 Privileged Access ManagementText lesson
-
76Week 6.15 Identity ManagementText lesson
-
77Week 6.16 Directory ServicesText lesson
-
78Week 6.17 Single Sign-on AuthenticationText lesson
-
79Week 6.18 FederationText lesson
-
80Week 6.19 Security Assertion Markup Language (SAML)Text lesson
-
81Week 6.20 Open Authentication (OAuth)Text lesson
-
82Implement Identity and Access Management Quiz10 questions
-
83Week 7.0 Cryptography & Secure Solution ImplementationPreview 3m
Description:
Cryptography & Secure Solution Implementation focuses on data protection using digital signatures, hashing, encryption, and key management, while ensuring systems are architected to resist tampering and unauthorized access. It includes selecting appropriate cryptographic algorithms, implementing secure communication protocols, managing certificates and keys, and integrating encryption into applications and storage solutions. The goal is to maintain data confidentiality, integrity, authenticity, and non-repudiation across all environments.
-
84Week 7.1 Cryptography conceptsText lesson
-
85Week 7.2 Symmetric EncryptionText lesson
-
86Week 7.3 Methods of Symmetric encryptionText lesson
-
87Week 7.3 Key LengthText lesson
-
88Week 7.5 Asymmetric encryptionText lesson
-
89Week 7 6 HashingText lesson
-
90Week 7.7 Digital SignatureText lesson
-
91Week 7.8 Public key infrastructureText lesson
-
92Week 7.9 Certificate AuthorityText lesson
-
93Week 7.10 Digital CertificatesText lesson
-
94Week 7.11 Root of TrustText lesson
-
95Week 7.12 Certificate Signing requestText lesson
-
96Week 7.13 Subject Name AttributesText lesson
-
97Week 7.14 Certificate revocationText lesson
-
98Week 7.15 Key managementText lesson
-
99Week 7 16 Cryptoprocessors and Secure EnclavesText lesson
-
100Week 7.17 Encryption Supporting ConfidentialityText lesson
-
101Week 7.18 Disk and File EncryptionText lesson
-
102Week 7.19 Database EncryptionText lesson
-
103Week 7.20 Perfect Forward SecrecyText lesson
-
104Week 7.21 Salting and Key StretchingText lesson
-
105Week 7.22 BlockchainText lesson
-
106Week 7.23 ObfuscationText lesson
-
107Cryptography & Secure Solution Implementation Quiz10 questions
-
108Week 7 CheckpointText lesson
-
109Week 8.0 Threats, Vulnerabilities, Risk & Social EngineeringPreview 3m
Description:
This area focuses on understanding the different ways systems can be compromised, including external threats, internal mistakes, and weaknesses in technology or processes. It involves identifying vulnerabilities that attackers may exploit, assessing the level of risk they pose to an organization, and applying strategies to reduce or manage that risk. It also includes recognizing social engineering techniques such as phishing, impersonation, and psychological manipulation that target human behavior rather than technical flaws. The goal is to build awareness and defenses that reduce the likelihood and impact of attacks.
-
110Week 8.1 Threats, Vulnerabilities, RiskText lesson
-
111Week 8.2 Attributes of Threat ActorsText lesson
-
112Week 8.3 Motivations of Threat ActorsText lesson
-
113Week 8.4 Hackers and HacktivistsText lesson
-
114Week 8.5 Nation-State ActorsText lesson
-
115Week 8.6 Organized Crime and CompetitorsText lesson
-
116Week 8.7 Internal Threat ActorsText lesson
-
117Week 8.8 Attack surface and threat vectorsText lesson
-
118Week 8.9 Vulnerable Software VectorsText lesson
-
119Week 8.10 Network VectorsText lesson
-
120Week 8.11 Message-Based VectorsText lesson
-
121Week 8.12 Supply Chain Attack SurfaceText lesson
-
122Week 8.13 Social EngineeringText lesson
-
123Threats, Vulnerabilities, Risk & Social Engineering Quiz10 questions
-
124Week 9.0 Explain Vulnerability Management IPreview 3m
Description:
Vulnerability Management is the continuous process of locating, evaluating, ranking, and fixing security flaws across an organization’s systems, applications, and networks. It involves continuous scanning, assessment, and tracking of vulnerabilities to ensure they are addressed before attackers can exploit them. This process also includes evaluating the severity of each weakness, coordinating fixes with IT teams, and verifying that remediation efforts are effective. The aim is to maintain a robust security posture by reducing exposure to potential threats through proactive and structured vulnerability handling.
-
125Week 9.1 Operating System VulnerabilitiesText lesson
-
126Week 9.2 Vulnerability TypesText lesson
-
127Week 9.3 Evaluation ScopeText lesson
-
128Week 9.4 Web Application AttacksText lesson
-
129Vulnerability Management Quiz10 questions
-
130Week 10.0 Explain Vulnerability Management IIPreview 3m
Description:
Vulnerability Management is the continuous process of locating, evaluating, ranking, and fixing security flaws across an organization’s systems, applications, and networks. It involves continuous scanning, assessment, and tracking of vulnerabilities to ensure they are addressed before attackers can exploit them. This process also includes evaluating the severity of each weakness, coordinating fixes with IT teams, and verifying that remediation efforts are effective. The aim is to maintain a robust security posture by reducing exposure to potential threats through proactive and structured vulnerability handling.
-
131Week 10.1 Threat FeedsText lesson
-
132Week 10.2 Other Vulnerability Assessment MethodsText lesson
-
133Week 10.3 Common Vulnerabilities and ExposuresText lesson
-
134Week 10 4 Types of Alerts and Log ReviewText lesson
-
135Vulnerability Management II Quiz10 questions
-
136Week 11.0 Analyze indicators of Malicious activitiesPreview 3m
Description:
Analyzing indicators of malicious activities involves detecting and interpreting signs that suggest a system, network, or user account may be compromised. This includes reviewing logs, alerts, behavioral anomalies, unusual traffic patterns, unauthorized changes, or suspicious file activity. By correlating these indicators with known attack techniques, analysts can determine whether an incident is occurring, assess its scope, and take appropriate response actions. The goal is to identify threats early, prevent further damage, and strengthen overall security defenses.
-
137Week 11.1 Malware ClassificationText lesson
-
138Week 11.2 TTPs and IoCsText lesson
-
139Week 11.3 Physical AttacksText lesson
-
140Analyze indicators of Malicious activities Quiz10 questions
-
141Week 12.0 Analyze indicators of Malicious activities - IIPreview 3m
Description:
Analyzing indicators of malicious activities involves detecting and interpreting signs that suggest a system, network, or user account may be compromised. This includes reviewing logs, alerts, behavioral anomalies, unusual traffic patterns, unauthorized changes, or suspicious file activity. By correlating these indicators with known attack techniques, analysts can determine whether an incident is occurring, assess its scope, and take appropriate response actions. The goal is to identify threats early, prevent further damage, and strengthen overall security defenses.
-
142Week 12.1 Network AttacksText lesson
-
143Week 12.2 Distributed Denial of Service AttacksText lesson
-
144Week 12.3 On-Path AttacksText lesson
-
145Week 12. 4 Domain Name System AttacksText lesson
-
146Week 12.5 Wireless AttacksText lesson
-
147Week 12.6 Password AttacksText lesson
-
148Analyze indicators of Malicious activities - II Quiz10 questions
-
149Week 13.0 Analyze indicators of Malicious activities - IIIPreview 3m
Description:
Analyzing indicators of malicious activities involves detecting and interpreting signs that suggest a system, network, or user account may be compromised. This includes reviewing logs, alerts, behavioral anomalies, unusual traffic patterns, unauthorized changes, or suspicious file activity. By correlating these indicators with known attack techniques, analysts can determine whether an incident is occurring, assess its scope, and take appropriate response actions. The goal is to identify threats early, prevent further damage, and strengthen overall security defenses.
-
150Week 13.1 Cryptographic AttacksText lesson
-
151Week 13.2 Malicious Code IndicatorsText lesson
-
152Week 13.3 Application AttacksText lesson
-
153Week 13.4 URL AnalysisText lesson
-
154Week 13.5 Web Server LogsText lesson
-
155Analyze indicators of Malicious activities - III Quiz10 questions
-
156Week 14.0 Secure Cloud Network ArchitecturePreview 3m
Description:
Secure cloud network architecture focuses on designing and implementing cloud environments that protect data, applications, and services from unauthorized access and cyber threats. It involves segmenting networks, enforcing strict access controls, encrypting data while it's in transit and at rest, keeping an eye out for irregularities in traffic, and integrating security tools like firewalls, intrusion detection/prevention systems, and secure gateways. The aim is to ensure availability, secrecy, and integrity while enabling scalable and resilient cloud operations.
-
157Week 14.1 Cloud Deployment ModelsText lesson
-
158Week 14.2 Cloud Service ModelsText lesson
-
159Week 14.3 Responsibility MatrixText lesson
-
160Week 14.4 Centralized and Decentralized ComputingText lesson
-
161Week 14.5. Resilient Architecture ConceptsText lesson
-
162Week 14.6 Application Virtualization and Container VirtualizationText lesson
-
163Week 14.7 Cloud ArchitectureText lesson
-
164Week 14.8 Cloud Automation TechnologiesText lesson
-
165Week 14.9 Cloud Architecture FeaturesText lesson
-
166Week 14.10 Cloud Security ConsiderationsText lesson
-
167Week 14.11 Embedded SystemsText lesson
-
168Week 14.12 Deperimeterization and Zero TrustText lesson
-
169Secure Cloud Network Architecture Quiz10 questions
-
170CheckpointText lesson
-
171Week 15.0 Explain ResiliencyPreview 3m
Description:
Resiliency refers to the ability of a system, network, or organization to continue operating effectively in the face of disruptions, failures, or attacks. In cybersecurity and IT, it involves designing systems that can withstand incidents, recover quickly, and maintain essential services with minimal downtime. This includes implementing redundancy, backup systems, disaster recovery plans, fault-tolerant architectures, and continuous monitoring to ensure business continuity even under adverse conditions.
-
172Week 15.1 Asset managementText lesson
-
173Week 15.2 Asset Protection ConceptsText lesson
-
174Week 15.3 Data BackupsText lesson
-
175Week 15.4 Advanced Data ProtectionText lesson
-
176Week 15.5 Secure Data DestructionText lesson
-
177Week 15.6 Continuity of operationsText lesson
-
178Week 15.7 Capacity Planning RisksText lesson
-
179Week 15.8 High AvailabilityText lesson
-
180Week 15.9 Platform Diversity and Defense in DepthText lesson
-
181Week 15.10 Deception TechnologiesText lesson
-
182Week 15.11 Testing ResiliencyText lesson
-
183Explain Resiliency Quiz10 questions
-
184Week 16.0 Site Security ConceptsPreview 3m
Description:
Site Security Concepts involve protecting a facility, data center, or physical location from unauthorized access, theft, damage, or environmental hazards. This includes perimeter controls, access management, surveillance, environmental protections, and security policies to ensure both people and assets remain safe while maintaining business continuity.
-
185Week 16.1 Physical Security ControlsText lesson
-
186Week 16.2 Site Layout, Fencing, and LightingText lesson
-
187Week 16.3 Gateways and LocksText lesson
-
188Week 16.4 Security Guards and CamerasText lesson
-
189Week 16.5 Alarm Systems and SensorsText lesson
-
190Site Security Concepts Quiz10 questions
-
191Week 17.0 Security Governance ConceptsPreview 3m
Description:
Security Governance Concepts refer to the framework and processes that guide an organization in managing its information security effectively. It involves establishing policies, roles, responsibilities, and accountability to make sure that security objectives are the same as business goals, regulatory requirements, and risk management strategies, promoting consistent decision-making and continuous improvement in security practices.
-
192Week 17.1 PoliciesText lesson
-
193Week 17.2 GuidelinesText lesson
-
194Week 17.3 ProceduresText lesson
-
195Week 17.4 Personnel ManagementText lesson
-
196Week 17.5 StandardsText lesson
-
197Week 17.6 Legal EnvironmentText lesson
-
198Week 17.7 Regulations and National, Local, Regional, and Industry LawsText lesson
-
199Week 17.8 Cybersecurity RegulationsText lesson
-
200Week 17.9 Governance and AccountabilityText lesson
-
201Week 17.10 Change managementText lesson
-
202Week 17.11 Allowed and Blocked ChangesText lesson
-
203Week 17.12 Documentation and Version ControlText lesson
-
204Security Governance Concepts Quiz10 questions
-
205Week 18.1 Data Classification and CompliancePreview 3m
Description:
Data Classification and Compliance involves categorizing information based on its sensitivity, value, and regulatory requirements to ensure appropriate handling, storage, and sharing. This practice helps organizations apply the correct security controls, meet legal and industry standards, and lessen the possibility of data breaches or fines/penalties for noncompliance.
-
206Week 18.2 Data TypesText lesson
-
207Week 18.3 Data ClassificationsText lesson
-
208Week 18.4 Data Sovereignty and Geographical ConsiderationsText lesson
-
209Week 18.5 Privacy DataText lesson
-
210Week 18.6 Privacy Breaches and Data BreachesText lesson
-
211Week 18.7 ComplianceText lesson
-
212Week 18.8 Monitoring and ReportingText lesson
-
213Week 18.9 Data ProtectionText lesson
-
214Week 18.10 Data Loss PreventionText lesson
-
215Data Classification and Compliance Quiz10 questions
-
216Week 19.1 Explain Risk management, Vendor Management concepts and AssessmentsPreview 3m
Description:
Risk Management, Vendor Management, and Assessments involve locating, assessing, and reducing possible risks to the operations, information, and reputation of an organisation. Risk management focuses on analyzing risks, determining their impact, and implementing controls to minimize or accept them within the organization’s risk tolerance. Vendor management ensures that third-party suppliers and service providers comply with security, legal, and operational standards to prevent supply chain risks. Assessments are systematic evaluations such as audits, security reviews, or compliance checks used to measure the effectiveness of controls, identify gaps, and ensure continuous improvement in both internal processes and vendor relationships.
-
217Week 19.2 Risk Identification and AssessmentText lesson
-
218Week 19.3 Risk Management StrategiesText lesson
-
219Week 19.4 Risk Management ProcessesText lesson
-
220Week 19.5 Business Impact AnalysisText lesson
-
221Week 19.6 Vendor selectionText lesson
-
222Week 19.7 Vendor Assessment MethodsText lesson
-
223Week 19.8 Legal AgreementsText lesson
-
224Week 19.9 Attestation and AssessmentsText lesson
-
225Week 19.10 Penetration TestingText lesson
-
226Week 19.11 Exercise TypesText lesson
-
227Explain Risk management, Vendor Management concepts and Assessments Quiz10 questions
-
228CheckpointText lesson
-
229Week 20.1 Explain Incident Response and Monitoring ConceptsPreview 3m
Description:
Incident Response and Monitoring Concepts involve the processes and tools used to detect, manage, and mitigate security incidents in an organization. Incident response is a organised method for locating, containing, eliminating, and recovering from security incidents, ensuring minimal impact on operations and compliance with legal requirements. Monitoring is the ongoing observation of systems, networks, and applications to detect anomalies, suspicious activities, or policy violations in real time. Together, these concepts enable organizations to respond quickly to threats, maintain operational resilience, and improve their overall security posture through lessons learned and continuous improvement.
-
230Week 20.2 Incident response processText lesson
-
231Week 20.3 PreparationText lesson
-
232Week 20.4 DetectionText lesson
-
233Week 20.5 AnalysisText lesson
-
234Week 20.6 ContainmentText lesson
-
235Week 20.7 Eradication and RecoveryText lesson
-
236Week 20.8 Lesson learntText lesson
-
237Week 20.9 Testing and TrainingText lesson
-
238Week 20.10 Threat HuntingText lesson
-
239Week 20.11 Due Process and Legal HoldText lesson
-
240Week 20.12 AcquisitionText lesson
-
241Week 20.13 System Memory AcquisitionText lesson
-
242Week 20.14 Disk Image AcquisitionText lesson
-
243Week 20.15 PreservationText lesson
-
244Week 20.16 ReportingText lesson
-
245Explain Incident Response and Monitoring Concepts Quiz10 questions
-
246CheckpointText lesson
Format: Weekly lessons, Quiz, Checkpoints and Mock exams.
Windows Laptop (8gb Ram and 512gb rom) and Stable internet.
Beginners to intermediate learners who want to not only pass the CompTIA security exam but also be job-ready cybersecurity analysts.
Popular Courses
Working hours
| Monday | 9:30 am - 6.00 pm |
| Tuesday | 9:30 am - 6.00 pm |
| Wednesday | 9:30 am - 6.00 pm |
| Thursday | 9:30 am - 6.00 pm |
| Friday | 9:30 am - 5.00 pm |
| Saturday | Closed |
| Sunday | Closed |