
Cyber Security Course
In an increasingly digital world, cybersecurity skills are essential for individuals, professionals, and organizations. This comprehensive course provides participants with a practical and theoretical understanding of both offensive and defensive security. Through hands-on labs, real-world scenarios, and expert guidance, participants will explore the core pillars of cybersecurity while building confidence to protect systems, data, and networks.
- Online via Google Meet
- 20 hours on demand video.
- Certificate of completion
Course Features
- Hands-on practical labs
- Real-world simulations
- Expert trainers
- Access to safe hacking environments
- Certificate of completion
Target Audience
- Students (High School & University)
- IT professionals seeking to expand their skills
- Educators interested in cybersecurity education
- Anyone passionate about ethical hacking and digital safety
Learning Objectives
By the end of this course, participants will be able to:
- Understand the foundations of offensive and defensive security
- Explore ethical hacking practices in controlled environments
- Master fundamental networking and Linux skills
- Analyze and secure DNS and web services
- Recognize common cybersecurity threats and learn mitigation techniques
- Apply incident response principles
Module | Lesson Title | Key Concepts |
---|---|---|
1 | Offensive Security Intro | Hack your first website (legally), understand offensive security principles |
2 | Defensive Security Intro | Introduction to defensive security and protective mechanisms |
3 | Introductory Networking | Networking theory and basic protocols |
4 | Linux Fundamentals Part 1 | Basics of Linux systems, file systems, and commands |
5 | DNS in Detail | Understand how DNS works and its role in internet communication |
6 | Web Technologies | Explore how websites and web services operate |
7 | Threat Modeling | Learn to identify potential security risks and how to model threats |
8 | VPN & Proxies | Understand VPN, proxies, and their role in privacy and security |
9 | OSINT | Open Source Intelligence — gather information legally from open sources |
10 | Active Directory Basics | Learn how Active Directory works and how it can be attacked and secured |
11 | Windows Security | Understand Windows-specific vulnerabilities and defense strategies |
12 | Incident Response | Respond effectively to security incidents and mitigate attacks |
13 | Malware Analysis | Basics of identifying and analyzing malware behavior |
14 | Phishing & Social Engineering | Recognize and protect against social engineering attacks |