Cyber Security Bootcamp | 3 modules | 560 Hours | 28 Weeks Students are expected to engage with the material at least 20 hours per week to maintain satisfactory progress through the course.
Module 1. Compliance & risks | 8 weeks | 160 hours This module introduces you to the essential concepts and practices in cybersecurity compliance and risk management. You will learn about the various frameworks, standards, and methodologies used to protect against cyber threats, manage risks, and ensure legal and regulatory compliance. By understanding and applying these principles, you will be equipped to develop and implement effective security policies and procedures.
Sprint 1. Cybersecurity Frameworks and Standards (2 weeks)In Sprint 1, you will learn about the cybersecurity frameworks and standards used to protect against cyber threats. You will learn about firewalls, intrusion detection systems, and virtual private networks (VPN) that can help protect your data. You will also learn about the most commonly used cybersecurity frameworks and standards, such as ISO and NIST, and how they can be applied to protect against cyber attacks.
Learning Outcomes:Learn about the role and importance of firewalls and intrusion detection systems in cybersecurity.
Understand the purpose of virtual private networks (VPN) in cybersecurity.
Understand the most commonly used cybersecurity frameworks and standards, such as ISO and NIST, and how they can be applied to protect against cyber attacks.
In Sprint 1, you will learn about the cybersecurity frameworks and standards used to protect against cyber threats. You will learn about firewalls, intrusion detection systems, and virtual private networks (VPN) that can help protect your data. You will also learn about the most commonly used cybersecurity frameworks and standards, such as ISO and NIST, and how they can be applied to protect against cyber attacks.
Sprint 2. Common Threats and Attack Vectors (2 weeks)In Sprint 2, you will learn about the most common threats and attack vectors that cybersecurity professionals face. You will learn about malware and virus threats, phishing attacks, and social engineering tactics that hackers use to access sensitive information. You will also learn about network security controls that can help protect against these threats.
Learning Outcomes:Identify common malware and virus threats, phishing attacks, and social engineering tactics.
Learn the purpose and importance of network security controls and how they can be used to mitigate cyber threats.
Gain an understanding of the fundamental concepts of cybersecurity and the importance of protecting sensitive information.
In Sprint 2, you will learn about the most common threats and attack vectors that cybersecurity professionals face. You will learn about malware and virus threats, phishing attacks, and social engineering tactics that hackers use to access sensitive information. You will also learn about network security controls that can help protect against these threats.
Learning Outcomes:Identify common malware and virus threats, phishing attacks, and social engineering tactics.
Learn the purpose and importance of network security controls and how they can be used to mitigate cyber threats.
Gain an understanding of the fundamental concepts of cybersecurity and the importance of protecting sensitive information.
Sprint 3. Risk Management (2 weeks)In Sprint 3, you will learn about risk assessment and management and the importance of developing security policies and procedures. You will learn about incident response planning and management, business continuity planning and disaster recovery. You will also learn about legal and regulatory compliance, such as HIPAA and GDPR, and the security audit and compliance frameworks, such as ISO and NIST.
Learning Outcomes:- Learn risk assessment and analysis methodologies.
- Develop security policies and procedures.
- Planned and managed incident response and business continuity.
- Comply with legal and regulatory requirements and frameworks.
Sprint 4. Cryptography and PKI (2 weeks)In Sprint 4, you will learn about symmetric and asymmetric encryption algorithms and how they are used to securely store and transfer sensitive information. You will also learn about secure key management and distribution, hashing and digital signature algorithms, and the different types of cryptographic attacks, such as brute-force and dictionary attacks. You will also learn about public key infrastructure (PKI) and certificate authorities (CA), and how they are used to secure sensitive information.
Learning Outcomes:- Learn how to securely manage and distribute encryption keys.
- Understand the role of PKI and CAs in securing sensitive information.
- Understand how to detect and prevent cryptographic attacks.
- Learn about hashing and digital signature algorithms.
- Understand how to identify vulnerabilities in an organization's computer systems.
Module 2. Networks | 6 weeks | 120 hoursThis module provides a comprehensive understanding of computer networks, including their architecture, protocols, devices, and security measures. You will gain knowledge of how data is transferred across networks, the various models and topologies used, and the essential devices that enable network functionality. Additionally, you will learn how to design, secure, and manage networks, ensuring their reliability and protection against threats.
Sprint 5. Introduction to Computer Networks (2 weeks)This learning part covers the basics of computer networks, such as data transfer, protocols, and network models. You'll learn about the OSI and TCP/IP models and the different network topologies and architectures.
Learning Outcomes:Understand the basics of computer networks, including data transfer and protocols.
Learn about the OSI and TCP/IP models.
Understand different network topologies and architectures.
Sprint 6. Network Devices and Security (2 weeks)This learning part covers network devices such as routers, switches, hubs, and modems. You'll learn about wireless networking and security protocols like WEP, WPA, and WPA2. In addition, you'll learn about network virtualization and cloud computing, as well as network troubleshooting and monitoring tools.
Learning Outcomes:- Understand the different network devices and their functions.
- Learn about wireless networking and security protocols.
- Understand network virtualization and cloud computing.
- Learn about network troubleshooting and monitoring tools.
Sprint 7. Designing and Managing a Secure Network (2 weeks)This learning part covers the skills needed to design and manage a secure network. You'll learn how to apply security measures to protect data and systems, as well as how to analyze and mitigate risks. In addition, you'll learn how to manage network policies, procedures, and standards.
Learning Outcomes:- Learn how to design and manage a secure network.
- Understand how to apply security measures to protect data and systems.
- Learn how to analyze and mitigate risks.
- Understand how to manage network policies, procedures, and standards.
Module 3. Vulnerability Management | 10 weeks | 200 hoursThis module equips you with the skills necessary to identify and mitigate vulnerabilities in computer networks. You will learn about various tools and techniques for vulnerability assessment, reconnaissance, scanning, enumeration, and ethical exploitation. These skills are essential for ensuring the security of an organization’s systems and data. You will gain hands-on experience in analyzing networks, identifying weaknesses, and understanding how attackers might exploit these vulnerabilities to enhance your defensive strategies.
Sprint 8. Common vulnerabilities (2 weeks)In Sprint 8, you will learn about analyzing computer networks for vulnerabilities and how to formalize risk prevention tasks. You will learn about the different tools and techniques used for vulnerability assessment and testing, both manual and automated. You will also learn how to report and document your findings.
Learning Outcomes:- Learn about vulnerability assessment and testing methodologies.
- Understand how to use different tools and techniques for vulnerability assessment and testing.
- Learn how to report and document your findings.
- Understand how to formalize risk prevention tasks.
Sprint 9. Reconnaissance and Footprinting Techniques (2 weeks)In Sprint 9, you will learn about reconnaissance and footprinting techniques used to gather information about an organization's computer systems, including its network topology and architecture, application servers, and vulnerabilities.
Learning Outcomes:- Understand the purpose and importance of reconnaissance and footprinting techniques.
- Learn how to gather information about an organization's computer systems.
- Understand how to identify vulnerabilities in an organization's computer systems.
Sprint 10. Scanning and Enumeration Tools (2 weeks)In Sprint 10, you will learn about scanning and enumeration tools used to identify open ports, services, and vulnerabilities in an organization's computer systems. You will also learn how to use these tools to map out an organization's network topology and architecture.
Learning Outcomes:- Understand the purpose and importance of scanning and enumeration tools.
- Learn how to identify open ports, services, and vulnerabilities in an organization's computer systems.
- Understand how to map out an organization's network topology and architecture.
Sprint 11. Vulnerability Assessment and Exploitation (2 weeks)In this sprint, you will learn how to conduct vulnerability assessments to identify weaknesses in systems, applications, and networks. You'll gain hands-on experience with various vulnerability assessment tools and techniques.
You will also dive into ethical exploitation methods, learning how attackers can leverage vulnerabilities to gain unauthorized access or escalate privileges. By understanding these tactics, you can better defend against real-world threats.
Learning Outcomes:- Understand vulnerability assessment methodologies
- Learn how to use automated and manual tools for vulnerability testing
- Gain experience identifying and exploiting common vulnerabilities
- Learn techniques for safely exploiting vulnerabilities for testing purposes
Sprint 12. CompTIA Security+ Exam Preparation (2 weeks)In this final sprint, you will undertake an intensive review covering all the domains of the CompTIA Security+ certification exam. Through practice questions, labs, and mock exams, you will reinforce the concepts learned throughout the program.
Learning Outcomes:- Attacks, Threats and Vulnerabilities
- Technologies and Tools
- Architecture and Design
- Identity and Access Management
- Risk Management
- Cryptography and PKI
Final project. Comprehensive Cybersecurity Assessment and Implementation | 4 weeks | 80 hours After building a comprehensive set of skills in cybersecurity compliance, network security, risk management, and vulnerability assessment, it’s time to combine these techniques to tackle a larger, real-world project. This module will focus on choosing the right combination of tools and methodologies to accomplish a holistic cybersecurity assessment and implementation.
The final step in this program is a capstone project where you will demonstrate your mastery of cybersecurity principles. You will be tasked with conducting a comprehensive cybersecurity assessment of a hypothetical organization. This will include identifying vulnerabilities, implementing security measures, and ensuring compliance with relevant frameworks and standards.
Students are expected to engage with the material at least 20 hours per week to maintain satisfactory progress through the course.