Course preview image Course preview image
  1. Home
  2. /
  3. Information Technology
  4. /

Cyber Security

Cyber Security

Last updated: Dec 14, 2025
Level Expert
Language English
Enrolments No enrolled students
Views 79

About This Course

 This program covers the fundamentals of security, ethical hacking, penetration testing, cryptography, incident response, cloud security, and compliance with real-world projects 

What you'll learn

  • Understand key concepts of cyber security, threats, and vulnerabilities.
  • Configure and secure operating systems, networks, and applications.
  • Perform penetration testing and vulnerability assessments.
  • Apply cryptographic techniques for securing communication and data.
  • Detect, respond to, and mitigate security incidents.
  • Implement compliance standards (ISO 27001, GDPR, HIPAA).
  • Gain practical exposure using tools like Wireshark, Metasploit, Nmap, Burp Suite, Kali Linux.

Course Curriculum

10 Topics
10 Lessons
total length

  • Introduction to Cyber Security

    read

    • What is Cyber Security?
    • Threats, Attacks, and Vulnerabilities
    • Security Principles (CIA Triad, AAA model)
    • Careers in Cyber Security

  • Networking & Security Fundamentals

    read

    • OSI & TCP/IP Model
    • Firewalls, IDS, IPS
    • VPN & Proxy Servers
    • Secure Network Design

  • Operating System & Application Security

    read

    • Windows & Linux Security Basics
    • Hardening Systems
    • Security Patches and Updates
    • Secure Application Development Basics

  • Cryptography

    read

    • Symmetric & Asymmetric Encryption
    • Hashing & Digital Signatures
    • SSL/TLS Certificates
    • Real-world Cryptographic Applications

  • Ethical Hacking & Penetration Testing

    read

    • Ethical Hacking Methodology
    • Reconnaissance & Scanning (Nmap, Nessus)
    • Exploitation (Metasploit)
    • Web Application Security (SQLi, XSS, CSRF)
    • Wireless Security Testing

  • Cyber Threats & Defense Mechanisms

    read

    • Malware Analysis
    • Phishing & Social Engineering Attacks
    • Advanced Persistent Threats (APT)
    • Security Operations & SIEM Tools

  • Cloud & Mobile Security

    read

    • Cloud Computing Security Models (IaaS, PaaS, SaaS)
    • Cloud Security Tools & Best Practices
    • Mobile Device Security & MDM
    • BYOD Security Policies

  • Incident Response & Forensics

    read

    • Incident Response Life Cycle
    • Log Analysis & Monitoring
    • Basics of Digital Forensics
    • Chain of Custody & Evidence Handling

  • Compliance & Risk Management

    read

    • Security Policies & Procedures
    • Risk Assessment & Mitigation
    • Standards: ISO 27001, GDPR, HIPAA, PCI DSS
    • Security Audit Practices

  • Capstone Project & Certification Preparation

    read

    • Real-World Security Project
    • Cyber Security Case Studies
    • Preparation (CEH, CompTIA Security+, CISSP basics)

Frequently Asked Questions

Yes, through labs, real-world case studies, and a capstone project.

Yes, it helps prepare for CompTIA Security+, CEH (Certified Ethical Hacker), CISSP (intro level), and OSCP (basics).

Cyber Security Analyst, Penetration Tester, SOC Analyst, Network Security Engineer, Information Security Consultant.

Kali Linux, Wireshark, Nmap, Burp Suite, Nessus, Metasploit, Splunk (SIEM), and cloud security tools.

Basic knowledge of computers and networking helps, but beginners can also start.

Prerequisites

  • Basic knowledge of computers and networking.
  • Familiarity with Windows/Linux operating systems.
  • Programming basics (Python, Java, or C) recommended but not mandatory.
  • No prior cyber security experience required (course starts from fundamentals).
8,000.00
10,000.00
20% OFF

Course Includes:

  • 10 Topics
  • 10 Lessons
  • 10 Articles
Infinite P

Infinite Pebble
Verified

Empowring Success through Customized Learning Strategies