@ 2023 Cyber Dojo. All rights reserved.
Description
Curriculum
Instructor
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Cybersecurity Essentials course. This course delves into the fundamental principles of computer and information security, empowering participants with the language and underlying mechanisms necessary to safeguard systems and organizations effectively. Tailored to address the specific needs of your organization, this course equips you with essential security knowledge vital for securing systems and combating cyber threats.
- Key Components of Cybersecurity Essentials:
- Security Program Development: Establishing a security program founded on Detection, Response, and Prevention principles. Implementing practical strategies to address high-priority security concerns within an organization.
- Adversarial Tactics Awareness: Understanding how adversaries adapt their tactics, techniques, and procedures. Adapting defense strategies accordingly to mitigate evolving threats.
- Ransomware Defense: Identifying the nature of ransomware threats and implementing effective defense mechanisms.
- Network Architecture and Indicators of Compromise: Leveraging defensible network architecture based on indicators of compromise. Implementing VLANs, Network Access Control (NAC), 802.1x, and Zero Trust principles.
- Identity and Access Management (IAM): Understanding IAM methodology and implementing strong authentication, including Multi-Factor Authentication (MFA).
- Cloud Security: Leveraging the security strengths and differences among various cloud providers, including multi-cloud environments.
- Vulnerability Management: Developing and implementing a capable vulnerability management program to mitigate risks effectively.
- Network Communication Analysis: Utilizing tools such as tcpdump and Wireshark to analyze network communication and identify potential security issues, including access credentials.
- System Analysis and Scripting: Using command-line tools on Windows, Linux, and macOS to analyze systems for indicators of compromise. Understanding basic scripting concepts for automating continuous monitoring tasks.
- Network Visibility and Risk Reduction: Building a network visibility map to validate attack surfaces and guide risk reduction strategies through hardening and configuration management.
- Cybersecurity Strategy: Understanding why some organizations succeed while others fail in cybersecurity. Implementing a risk-based approach to cyber defense for long-term success.
- Hands-On Training:
- The course offers extensive lab-based exercises, providing students with practical experience applying course concepts.
- Labs are based on real-world scenarios, allowing students to grasp the challenges they’ll face in their careers.
- Certification Opportunity:
- You can obtain the GSEC certification validating the acquired skills and knowledge.
Get the course now to unlock the gateway to a thriving and lifelong career in Cybersecurity.
Certificate Sample..
————————————————————————
- Important Notice:
- This course is independent and not sponsored, endorsed, or affiliated with organizations such as IBM, SANS, INE, Microsoft, Cisco, and others.
- This course is presented as a prerecorded program, offering flexibility for learners to access the content at their own pace and convenience.
- The modules are designed to be consumed in a sequential manner, allowing participants to navigate through the material at a time that suits their individual schedules.
- Please note that being prerecorded, the course does not involve live, real-time interactions with instructors except through the one-to-one support sessions.
- Participants can pause, rewind, and replay the content as needed to enhance their understanding of the subject matter.
- It includes opportunities for open discussion through dedicated discussion boards that enable participants to engage with peers, share insights, and ask questions related to the course content
————————————————————————
:إشعار مهم
هذا الكورس مستقل وليس برعاية أو مصادقة أو مرتبط بمنظمات مثل اي بي ام او سانز او اي ان اي او مايكروسوفت اوسيسكو او غيرهم من المنظمات
يتم تقديم هذا الدورة كبرنامج تم تسجيله مسبقًا، مما يوفر مرونة للمتعلمين للوصول إلى المحتوى بوتيرتهم وراحتهم
تم تصميم الوحدات لتكون مستهلكة بطريقة تسلسلية، مما يتيح للمشاركين التنقل في المواد في وقت يناسب جداولهم الفردية
يرجى ملاحظة أنه نظرًا لأنها مسجلة مسبقًا، لا تشمل الدورة تفاعلات حية في الوقت الحقيقي مع المدرسين باستثناء عن طريق جلسات الدعم الفردية
يمكن للمشاركين إيقاف التشغيل والترجيع وإعادة تشغيل المحتوى حسب الحاجة لتعزيز فهمهم للموضوع
تتضمن الدورة فرصًا للنقاش المفتوح من خلال لوحات نقاش مخصصة تمكن المشاركين من التفاعل مع الزملاء، ومشاركة الأفكار، وطرح الأسئلة المتعلقة بمحتوى الدورة
Curriculum
- 9 Sections
- 97 Lessons
- 52 Weeks
Expand all sectionsCollapse all sections
- Introduction to Cyber Dojo Platform3
- Chapter 1: Network Security and Cloud Essentials13
- 2.1Module 1: Introduction to Cybersecurity Essentials Course18 Minutes
- 2.2Module 2: Defensible Network Architecture4 Hours
- 2.3Lab 1.1: Virtual Machine Setup8 Minutes
- 2.4Module 3: Protocols and Packet Analysis3 Hours
- 2.5Lab 1.2: tcpdump30 Minutes
- 2.6TryHackMe Bonus Lab: Tcpdump: The Basics32 Minutes
- 2.7Module 4: Virtualization and Cloud Essentials5 Hours
- 2.8Lab 1.3: Wireshark32 Minutes
- 2.9TryHackMe Bonus Lab: Wireshark 10150 Minutes
- 2.10Module 5: Securing Wireless Networks4 Hours
- 2.11Lab 1.4: Aircrack-ng18 Minutes
- 2.12TryHackMe Bonus Lab: Wifi Hacking 10121 Minutes
- 2.13WireDeep CTF45 Minutes10 Questions
- Chapter 2: Defense-in-Depth13
- 3.1Module 6: Defense-in-Depth4 Hours
- 3.2Module 7: Identity & Access Management2 Hours
- 3.3TryHackMe Bonus Lab: Identity and Access Management26 Minutes
- 3.4Module 8: Authentication and Password Security2 Hours
- 3.5Lab 2.1: Hashcat46 Minutes
- 3.6TryHackMe Bonus Lab: John the Ripper: The Basics1 Hour
- 3.7Module 9: Security Frameworks2 Hours
- 3.8TryHackMe: Governance & Regulation1 Hour
- 3.9Lab 2.2: Cain and Abel29 Minutes
- 3.10Module 10: Data Loss Prevention3 Hours
- 3.11Lab 2.3: AppLocker18 Minutes
- 3.12Module 11: Mobile Device Security1 Hour
- 3.13Quiz: Password Cracking2 Hours14 Questions
- Chapter 3: Vulnerability Management and Response30
- 4.1Module 12: Vulnerability Assessments2 Hours
- 4.2TryHackMe Bonus Lab: Nessus38 Minutes
- 4.3TryHackMe Bonus Lab: OpenVAS28 Minutes
- 4.4Module 13: Penetration Testing3 Hours
- 4.5Lab 3.1: Nmap35 Minutes
- 4.6TryHackMe Bonus Lab: Nmap: The Basics33 Minutes
- 4.7TryHackMe Bonus Lab: Nmap Live Host Discovery33 Minutes
- 4.8TryHackMe Bonus Lab: Nmap Basic Port Scans20 Minutes
- 4.9TryHackMe Bonus Lab: Nmap Advanced Port Scans31 Minutes
- 4.10TryHackMe Bonus Lab: Nmap Post Port Scans26 Minutes
- 4.11Quiz: Nmap60 Minutes41 Questions
- 4.12Module 14: Attacks and Malicious Software4 Hours
- 4.13Lab 3.2: Malicious Software23 Minutes
- 4.14TryHackMe Bonus Lab: Web Application Basics40 Minutes
- 4.15Module 15: Web Application Security2 Hours
- 4.16Lab 3.3: Command Injection14 Minutes
- 4.17TryHackMe Bonus Lab: Burp Suite: The Basics48 Minutes
- 4.18TryHackMe Bonus Lab: Burp Suite: Repeater28 Minutes
- 4.19TryHackMe Bonus Lab: Burp Suite: Intruder38 Minutes
- 4.20TryHackMe Bonus Lab: Burp Suite: Other Modules21 Minutes
- 4.21TryHackMe Bonus Lab: Burp Suite: Extensions8 Minutes
- 4.22Portswigger Bonus Lab – File Path Traversal, Simple Case4 Minutes
- 4.23Portswigger Bonus Lab – Stored XSS into HTML Context with Nothing Encoded6 Minutes
- 4.24Portswigger Bonus Lab – Exploiting Cross-Site Scripting to Steal Cookies10 Minutes
- 4.25Portswigger Bonus Lab – Web Shell Upload via Content-Type Restriction Bypass13 Minutes
- 4.26Module 16: Security Operations and Log Management2 Hours
- 4.27Module 17: Digital Forensics and Incident Response2 Hours
- 4.28TryHackMe Bonus Lab: Defensive Security Intro23 Minutes
- 4.29Lab 3.4: hping322 Minutes
- 4.30Self Study: Hping Tips and Tricks25 Minutes
- Chapter 4: Data Security Technologies17
- 5.1Module 18: Cryptography3 Hours
- 5.2Lab 4.1: Image Steganography15 Minutes
- 5.3Images3c CTF60 Minutes1 Question
- 5.4Module 19: Cryptography Algorithms and Deployment51 Minutes
- 5.5Module 20: Applying Cryptography2 Hours
- 5.6Lab 4.2: GNU Privacy Guard (GPG)17 Minutes
- 5.7TryHackMe Bonus Lab: Cryptography for Dummies11 Minutes
- 5.8TryHackMe Bonus Lab: Cryptography Basics16 Minutes
- 5.9TryHackMe Bonus Lab: Public Key Cryptography Basics24 Minutes
- 5.10TryHackMe Bonus Lab: Hashing Basics36 Minutes
- 5.11Module 21: Network Security Devices3 Hours
- 5.12Lab 4.3: Snort27 Minutes
- 5.13TryHackMe Bonus Lab: Snort1 Hour
- 5.14TryHackMe Bonus Lab: Snort Challenge – The Basics1 Hour
- 5.15TryHackMe Bonus Lab: Snort Challenge – Live Attacks15 Minutes
- 5.16Module 22: Endpoint Security1 Hour
- 5.17Lab 4.4: Hashing13 Minutes
- Chapter 5: Windows and Azure Security12
- 6.1Module 23: Windows Security Infrastructure2 Hours
- 6.2Bonus: Introduction to Windows Internals2 Hours
- 6.3Lab 5.1: Process Hacker23 Minutes
- 6.4Module 24: Windows as a Service38 Minutes
- 6.5Module 25: Windows Access Controls2 Hours
- 6.6Lab 5.2: NTFS Permissions Reporter17 Minutes
- 6.7Module 26: Enforcing Security Policy1 Hour
- 6.8Lab 5.3: SECEDIT.EXE16 Minutes
- 6.9TryHackMe Bonus Lab: Active Directory Basics34 Minutes
- 6.10Module 27: Microsoft Cloud Computing1 Hour
- 6.11Module 28: Automation, Logging, and Auditing1 Hour
- 6.12Lab 5.4: PowerShell Scripting41 Minutes
- Chapter 6: Linux, AWS, and Mac Security10
- 7.1Module 29: Linux Fundamentals1 Hour
- 7.2Bonus: Linux Basic Commands90 Minutes
- 7.3TryHackMe Bonus Lab: Linux Fundamentals Part 127 Minutes
- 7.4TryHackMe Bonus Lab: Linux Fundamentals Part 228 Minutes
- 7.5TryHackMe Bonus Lab: Linux Fundamentals Part 329 Minutes
- 7.6Module 30: Linux Security Enhancements and Infrastructure59 Minutes
- 7.7Module 31: Containerized Security22 Minutes
- 7.8ASC2021 – Container Security1 Hour
- 7.9Module 32: AWS Essentials, Controls, and Best Practices43 Minutes
- 7.10Module 33: macOS Security16 Minutes
- Final Exam1
- Project - Planning for Security Controls4
Review
Cybersecurity and IT Essentials

200 $
150 $
100% positive reviews
89 students
97 lessons
Language: Arabic
5 quizzes
Assessments: Self
Granted Access Time: 52 weeks
Skill level Beginner
Courses you might be interested in
Digital Forensics, Incident Response & Threat Hunting
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Windows Forensic Examiner course. This course equips participants with advanced forensic analysis skills specifically for...
-
54 Lessons
Offensive Operations, Pen Testing, and Red Teaming
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Enterprise Penetration Tester course. This course equips participants with the essential skills and techniques for conducting...
-
116 Lessons
Cyber Defense
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Security Operations Analyst course. This course equips learners with foundational skills and knowledge necessary to operate...
-
87 Lessons
Offensive Operations, Pen Testing, and Red Teaming
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Incident Handler course. This course equips participants with the essential skills and knowledge to effectively respond...
-
88 Lessons
Offensive Operations, Pen Testing, and Red Teaming
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Web Application Penetration Tester course. This course equips participants with the skills to conduct thorough web...
-
114 Lessons
Upcoming Events
Most Popular Blog
From PICERL to DAIR: The New Incident Response Process with a Flexible Approach
May 17, 2024
No Comments
Read More »
Most Popular Course
-
97 Lessons
Cybersecurity and IT Essentials
Unlock the foundational knowledge and practical skills to defend against cyber threats with Cyber Dojo’s Cybersecurity Essentials course. This course delves into the fundamental principles of computer and information security, empowering...