Module #1 Introduction to Cybersecurity Overview of cybersecurity, threats, and importance of defense
Module #2 Cybersecurity Fundamentals Foundational concepts of cybersecurity, including CIA triad, threats, and vulnerabilities
Module #3 Types of Cyber Threats Common types of cyber threats, including malware, phishing, and ransomware
Module #4 Network Security Network security principles, including firewalls, routers, and network architecture
Module #5 Cryptography and Encryption Introduction to cryptography, encryption, and decryption techniques
Module #6 Identity and Access Management IAM principles, including authentication, authorization, and access control
Module #7 Operating System Security Securing Windows and Linux operating systems, including hardening and patch management
Module #8 Database Security Securing databases, including SQL injection and data encryption
Module #9 Cloud Security Cloud computing security, including AWS, Azure, and Google Cloud Platform
Module #10 Incident Response and Management Responding to and managing cybersecurity incidents, including containment and recovery
Module #11 Compliance and Regulatory Frameworks Major cybersecurity regulations and compliance frameworks, including HIPAA and PCI-DSS
Module #12 Risk Management and Assessment Identifying and assessing cybersecurity risks, including threat modeling and risk analysis
Module #13 Penetration Testing and Ethical Hacking Introduction to penetration testing and ethical hacking, including tools and techniques
Module #14 Secure Coding Practices Writing secure code, including secure development life cycles and DevSecOps
Module #15 Network Security Architectures Designing and implementing secure network architectures, including DMZ and VLANs
Module #16 Security Information and Event Management (SIEM) Implementing and managing SIEM systems, including log collection and analysis
Module #17 Cybersecurity for IoT and Embedded Systems Securing IoT and embedded systems, including unique challenges and considerations
Module #18 Artificial Intelligence and Machine Learning in Cybersecurity AI and ML applications in cybersecurity, including threat detection and response
Module #19 Human Factors in Cybersecurity The human element in cybersecurity, including social engineering and user awareness
Module #20 Cybersecurity Governance and Policy Developing and implementing cybersecurity governance and policy, including risk management and compliance
Module #21 Cloud-Based Cybersecurity Solutions Cloud-based security solutions, including SaaS, PaaS, and IaaS
Module #22 Cybersecurity for Small and Medium-Sized Businesses Unique cybersecurity challenges and considerations for SMBs
Module #23 Cybersecurity Career Development and Professional Certifications Career development and professional certifications in cybersecurity, including CompTIA Security+ and CISSP
Module #24 Course Wrap-Up & Conclusion Planning next steps in Cybersecurity and Defense career