Cybersecurity
To become a master defender, you must first master the mindset of an attacker. This course immerses you in the tactics of ethical hacking, phishing, and malware analysis, allowing you to understand how adversaries think and operate. Gain immediate, hands-on expertise in the foundations of system and network security, equipping you with the critical skills needed to actively defend against sophisticated cyber-attacks.
What You'll Learn
- Introduction to cybersecurity
- Network Security & Hardening
- Ethical Hacking & Penetration Testing
- Security Operations (SecOps)
- Cryptography & Public Key Infrastructure (PKI)
- Cloud Security Principles
- Governance, Risk, Compliance (GRC)
- Secure Coding Principles
Who This Course is For
- Complete Beginners: Individuals with little to no prior IT experience who are looking to enter the high-growth field of cybersecurity from the ground up.
- IT Professionals: System administrators, network engineers, or developers looking to pivot and specialize in a security-focused role.
- Career Changers: Anyone with strong problem-solving skills and a technical interest seeking a secure, in-demand career path.
- Students & Graduates: Those in computer science or related fields who want to gain practical, industry-relevant security skills that academic programs often lack.
Prerequisites
- A basic understanding of computer hardware and operating systems (Windows, Linux, or macOS).
- Familiarity with networking concepts (e.g., what an IP address and a router are).
- Strong problem-solving skills and a willingness to learn technical concepts.
- A reliable computer and internet connection for online classes.
What's Included
This course features a robust hybrid learning model:
- Physical Classes: 3 days per week — hands-on coding, collaborative projects, and core lectures.
- Online Classes: 2 days per week — code reviews, debugging, Q&A, and deep dives.
- Physical Weekend Sessions: Admits students who can only attend weekend classes - Saturdays and Sundays.
- Course Materials
- Code Mentorship
- Portfolio Development
- Certificate of Completion
Tools & Technologies You Will Use
- Operating Systems: Kali Linux, Windows Server.
- Vulnerability Scanning/Penetration Testing: Nmap, Wireshark, Metasploit, Burp Suite.
- SIEM/Monitoring: Splunk (or a similar open-source alternative like ELK Stack).
- Firewalls/Networking: Cisco Packet Tracer or similar network simulation tools.
- Programming/Scripting: Python (for automation and basic exploit writing)
Capstone Project
Simulated Enterprise Security Audit & Incident Response You will work in a small team to perform a full-scope penetration test and security audit on a simulated corporate network environment.