Curriculum
- 40 Sections
- 80 Lessons
- 10 Weeks
Expand all sectionsCollapse all sections
- Course Introduction & Exam Overview2
- Cybersecurity Fundamentals & Terminology2
- Risk Management & Security Policies2
- Threat Actors & Attack Vectors2
- Social Engineering & Insider Threats2
- Network Basics (TCP/IP, OSI Model, Ports)2
- Secure Network Design & Architecture2
- Secure Network Protocols (HTTPS, TLS, VPNs)2
- DWireless Security & Hardening Techniques2
- IDS, IPS, Firewalls & Network Access Control2
- Malware Types (Viruses, Ransomware, Trojans)2
- Advanced Persistent Threats (APTs) & Zero-Day Attacks2
- Web-Based Attacks (SQL Injection, XSS, CSRF)2
- Denial-of-Service (DoS/DDoS) Attacks2
- Privilege Escalation & Brute Force Attacks2
- Security Event Management & SIEM2
- Incident Response & Digital Forensics Basics2
- Logs, Monitoring, and Threat Hunting2
- Penetration Testing vs. Vulnerability Scanning2
- Business Continuity & Disaster Recovery2
- Authentication & Authorization (MFA, SSO)2
- Identity Federation & Role-Based Access Control (RBAC)2
- Credential Management & Password Policies2
- Biometrics, Smart Cards & Security Tokens2
- Privileged Access Management (PAM)2
- Cryptographic Basics & Hashing (MD5, SHA)2
- Symmetric vs. Asymmetric Encryption2
- Public Key Infrastructure (PKI) & Certificates2
- Digital Signatures & Certificate Authorities2
- Cryptographic Attacks & Best Practices2
- Secure Coding Principles (OWASP, SDLC)2
- Cloud Security & Virtualization Security2
- Containers, Microservices & Serverless Security2
- Mobile & IoT Security Risks2
- Data Protection & Privacy Regulations (GDPR, CCPA)2
- Compliance & Security Frameworks (NIST, ISO 27001)2
- Security Auditing & Continuous Monitoring2
- Ethical Hacking & Red Team vs. Blue Team2
- Practice Exam & Review2
- Final Exam Tips & Career Guidance2















