0% found this document useful (0 votes)
34 views9 pages

Cybersecurity CyberGuard Pro Training

The CyberGuard Pro Training course is a comprehensive 6-month program designed to prepare students for a career in cybersecurity, covering foundational to advanced skills aligned with certifications like ISC2 CC and CompTIA Security+. The curriculum includes practical lab sessions on various topics such as network security, ethical hacking, and incident response, utilizing tools like Parrot OS and TryHackMe. The course costs Rs. 70,000, with an introductory offer of Rs. 63,000, and includes a final month focused on certification preparations.

Uploaded by

ranjitshrijan101
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views9 pages

Cybersecurity CyberGuard Pro Training

The CyberGuard Pro Training course is a comprehensive 6-month program designed to prepare students for a career in cybersecurity, covering foundational to advanced skills aligned with certifications like ISC2 CC and CompTIA Security+. The curriculum includes practical lab sessions on various topics such as network security, ethical hacking, and incident response, utilizing tools like Parrot OS and TryHackMe. The course costs Rs. 70,000, with an introductory offer of Rs. 63,000, and includes a final month focused on certification preparations.

Uploaded by

ranjitshrijan101
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Cybersecurity CyberGuard Pro Training

Course Description:
This course helps the student to start a career in the cybersecurity field. It covers everything from basic skill sets to
advanced skill sets with practical knowledge. The duration includes 6 months and aligns with major cybersecurity
certifications such as ISC2 Certified in Cybersecurity (CC) and CompTIA Security+ programs. This course
incorporates online practical lab sessions in various cybersecurity environments, including malware analysis, web
penetration testing, network security, and ethical hacking. Online Labs are conducted using tools like Parrot OS,
TryHackMe, DVWA, BlueTeam Lab, and PentesterLab to provide comprehensive hands-on experience.

Course Topics

1. Foundational Concepts & Security Fundamentals

2. Network Security, Cloud Security & Threat Management

3. Incident Response, Endpoint Security & Ethical Hacking

4. Advanced Offensive Security, Governance & Auditing

5. Cloud Security, Identity & Access Management (IAM)

6. Certifications & Advanced Concepts

Course Detail

Month 1: Foundational Concepts & Security Fundamentals

Week 1: Introduction to Cybersecurity

● Objective: Introduction to cybersecurity, career paths, and key certifications.

● Topics:

○ Overview of security roles, career paths, and certifications (Fortinet, Cisco, Check Point).

○ Key cybersecurity principles: CIA Triad, security fundamentals.

● Hands-on Activity: Analyze a basic cybersecurity scenario and identify risks.

Week 2: Basic Networking and OSI Model

● Objective: Understand networking basics and the OSI model.

● Topics:
○ OSI model: Roles of each layer in networking and security.

○ IP addressing, subnetting, VLANs, and TCP/IP protocols.

○ Network devices: routers, switches, and firewalls.

● Hands-on Activity: Configure IP addressing and routing on Cisco devices using Packet Tracer.

Week 3: Cryptography Basics

● Objective: Learn cryptographic techniques for secure communications.

● Topics:

○ Encryption (AES, RSA), hashing algorithms, PKI.

○ Digital certificates, SSL/TLS.

● Hands-on Activity: Create and manage digital certificates for a secure web application.

Week 4: Security Policies, Risk Management, and Compliance

● Objective: Introduction to risk management, compliance, and security governance.

● Topics:

○ Risk management frameworks (NIST, ISO 27001), governance, and compliance standards.

○ Common policies: password, access control, data protection.

● Hands-on Activity: Draft a basic risk management and compliance policy for an organization.

Month 2: Network Security, Cloud Security & Threat Management

Week 5: Threats, Attacks, and Vulnerabilities

● Objective: Learn about common cybersecurity threats and vulnerabilities.

● Topics:

○ Types of cyberattacks: DDoS, phishing, man-in-the-middle, malware.

○ Vulnerability assessment and management.


● Hands-on Activity: Conduct a vulnerability scan using Nessus or OpenVAS.

Week 6: Firewalls, IDS/IPS, and VPNs

● Objective: Learn to configure firewalls, IDS/IPS, and VPNs for network security.

● Topics:

○ Firewall technologies (stateful, stateless, next-gen firewalls).

○ Intrusion detection/prevention systems (IDS/IPS).

○ Configuring site-to-site and client VPNs.

● Hands-on Activity: Configure a Check Point firewall and set up an IPSec VPN.

Week 7: Cloud Security Essentials

● Objective: Secure cloud infrastructure and understand cloud security principles.

● Topics:

○ Cloud service models (IaaS, PaaS, SaaS) and shared responsibility model.

○ Cloud provider security tools: AWS IAM, Azure Security Center.

● Hands-on Activity: Configure secure cloud infrastructure using AWS.

Week 8: Advanced Threat Management

● Objective: Learn advanced threat detection and mitigation techniques.

● Topics:

○ Threat hunting, APTs, and zero-day exploits.

○ Analyzing attack patterns using the MITRE ATT&CK framework.

● Hands-on Activity: Simulate an attack and mitigate using SIEM tools.

Month 3: Incident Response, Endpoint Security & Ethical Hacking

Week 9: Endpoint Security & Vulnerability Management


● Objective: Learn to protect endpoints and manage vulnerabilities.

● Topics:

○ Endpoint security: antivirus, EDR, mobile device management (MDM).

○ Vulnerability management lifecycle (scanning, patching, reporting).

● Hands-on Activity: Implement endpoint protection using Fortinet or other EDR tools.

Week 10: Incident Response and Forensics

● Objective: Learn incident response and digital forensics principles.

● Topics:

○ Incident response lifecycle (preparation, detection, recovery).

○ Forensics: data acquisition, log analysis, and chain of custody.

● Hands-on Activity: Perform a digital forensics analysis using Autopsy or FTK.

Week 11: Penetration Testing & Ethical Hacking Basics

● Objective: Conduct penetration testing and ethical hacking.

● Topics:

○ Ethical hacking methodologies (reconnaissance, scanning, exploitation).

○ Common vulnerabilities: SQL injection, XSS, buffer overflow.

● Hands-on Activity: Perform a penetration test using Kali Linux and Metasploit.

Week 12: Security Monitoring & SIEM Solutions

● Objective: Implement and configure SIEM for monitoring security events.

● Topics:

○ SIEM overview, log collection, and correlation.

○ Analyzing security events using Splunk, ELK, or FortiSIEM.

● Hands-on Activity: Configure an SIEM system and create alerts for abnormal network activity.
Month 4: Advanced Offensive Security, Governance & Auditing

Week 13: Advanced Penetration Testing Techniques

● Objective: Perform advanced penetration testing techniques.

● Topics:

○ Exploit development, buffer overflow, privilege escalation.

○ Post-exploitation persistence techniques.

● Hands-on Activity: Execute a complex penetration test on a multi-tiered network.

Week 14: Auditing and Compliance

● Objective: Learn auditing and compliance standards in cybersecurity.

● Topics:

○ IT auditing principles, audit lifecycle.

○ Key frameworks: COBIT, ISO 27001, PCI-DSS, NIST.

● Hands-on Activity: Conduct a basic audit for compliance using a security audit tool.

Week 15: Web Application Security & Secure Coding

● Objective: Learn how to secure web applications and write secure code.

● Topics:

○ OWASP Top 10: SQL Injection, Cross-Site Scripting (XSS), CSRF.

○ Secure coding best practices.

● Hands-on Activity: Test and secure a web application using OWASP ZAP.

Week 16: Governance, Risk, and Compliance (GRC)

● Objective: Learn how to manage governance, risk, and compliance (GRC).

● Topics:

○ GRC frameworks, risk management, and business continuity.

○ Security policies and procedures for GRC.


● Hands-on Activity: Create a risk management plan and business continuity strategy.

Month 5: Cloud Security, Identity & Access Management (IAM)

Week 17: Advanced Cloud Security

● Objective: Secure cloud services and infrastructure.

● Topics:

○ Cloud security best practices: encryption, secure APIs.

○ Securing multi-cloud environments and hybrid cloud architectures.

● Hands-on Activity: Configure cloud security controls using AWS IAM and security policies.

Week 18: Identity and Access Management (IAM)

● Objective: Manage identities, access controls, and authorization.

● Topics:

○ IAM fundamentals: authentication, authorization, RBAC, SSO.

○ Multi-factor authentication (MFA), zero trust architecture.

● Hands-on Activity: Configure MFA and access control for a corporate environment.

Week 19: Zero Trust Architecture

● Objective: Learn how to implement and manage a zero-trust security model.

● Topics:

○ Principles of zero trust: never trust, always verify.

○ Implementing zero trust in networks and cloud infrastructure.

● Hands-on Activity: Design and implement a zero-trust network for a company.

Week 20: DevSecOps and Security Automation


● Objective: Integrate security into the DevOps pipeline.

● Topics:

○ Secure DevOps: CI/CD pipelines, infrastructure as code (IaC).

○ Security automation and orchestration (SOAR).

● Hands-on Activity: Automate security tasks in a CI/CD pipeline using Jenkins.

Month 6: Final Preparations, Certifications & Advanced Concepts

Week 21: Data Privacy and Protection

● Objective: Learn data protection principles and regulatory requirements.

● Topics:

○ Data privacy regulations: GDPR, CCPA, HIPAA.

○ Encryption, anonymization, and data protection techniques.

● Hands-on Activity: Create a data protection policy for an organization.

● Certification Alignment: CDPSE, CISSP, CISA, CCSP.

Week 22: Advanced Network Security

● Objective: Learn advanced network security techniques and tools.

● Topics:

○ Network segmentation, defense-in-depth, and secure network architecture.

○ Network security protocols (802.1x, NAC).

● Hands-on Activity: Configure advanced network security controls using Cisco and Fortinet.

● Certification Alignment: CISSP, CCNA Security, GSEC, CCSA, Fortinet NSE.

Week 23: Exam Prep: Mock Exams & Final Review

● Objective: Prepare for certification exams with mock tests and reviews.

● Topics:

○ Review for CC, Security+, CEH, CCNA Security, CCSA, CCSP, CISSP.

○ Focus on weak areas and hands-on labs.


● Hands-on Activity: Take a full-length mock exam for the chosen certification.

● Certification Alignment: CC, Security+, CEH, CCSP, CISSP, Fortinet NSE.

Week 24: Capstone Project

● Objective: Complete a comprehensive security project applying learned skills.

● Topics:

○ Design a secure network, cloud infrastructure, or application based on a real-world scenario.

○ Incorporate firewalls, IAM, encryption, and incident response strategies.

● Hands-on Activity: Present the capstone project to a panel of experts.

● Certification Alignment: General review for all certifications.

Key Certification Alignment by Topic:

● Networking Certifications:

○ Cisco CCNA Security: OSI Model, routing, firewall basics, VPN, IDS/IPS, network security

protocols.

○ Fortinet NSE: Firewall configuration, VPNs, endpoint security, advanced threat protection.

○ Check Point CCSA/CCSE: Firewall setup, VPNs, advanced intrusion prevention, security

management.

● Cybersecurity Certifications:

○ CC (Certified in Cybersecurity): Basic cybersecurity concepts and foundational knowledge.

○ Security+: Broad security coverage, including network security, threats, and IAM.

○ CISSP: Advanced topics in governance, risk management, security architecture, and operations.

○ CEH: Offensive security, ethical hacking, penetration testing techniques.

○ CCSP: Cloud security architecture and design.

○ OSCP: Advanced hands-on penetration testing and exploitation techniques.

○ GSEC: Hands-on skills across network security, cryptography, incident response, and IAM.

○ CISM: Security management, governance, and risk management.

○ CISA: Auditing and compliance for IT environments.

○ ECIH: Incident handling and response.

○ CDPSE: Data privacy, protection, and regulatory compliance (GDPR, CCPA).


Cost Structure

Rs. 70,000.00 (inclusive of all taxes)

Payment Terms

Down Payment

Rs. 14,000

Rs. 11200 X 5 Installments

Introductory Offer

10% discount on total course fee = Rs. 63,000.00

Payment Terms

Down Payment

Rs. 12,600

Rs 10080.00 X 5 Installment

Note: Final Preparations, Certifications & Advanced Concepts

The course spans a total of 6 months. During the final month, students will undergo Final Preparations,

Certifications & Advanced Concepts. Please be aware that if you wish to pursue the certification, an additional fee

will be required for the certification process.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy