Module #1 Introduction to Cyber Defense Overview of the importance of cyber defense, threat landscape, and course objectives
Module #2 Cybersecurity Fundamentals Review of basic security concepts, including CIA triad, security models, and risk management
Module #3 Threat Intelligence and Analysis Understanding threat intelligence, types of threats, and threat analysis techniques
Module #4 Network Fundamentals for Cyber Defense Networking basics, protocols, and architectures relevant to cyber defense
Module #5 Host-Based Security Securing endpoints, including operating system hardening, patch management, and host-based intrusion detection
Module #6 Network Security Architectures Designing and implementing secure network architectures, including firewalls, IDS/IPS, and VPNs
Module #7 Cryptography for Cyber Defense Understanding cryptography concepts, including encryption, decryption, hashing, and digital signatures
Module #8 Access Control and Authentication Implementing access control mechanisms, including authentication, authorization, and accounting (AAA)
Module #9 Incident Response and Handling Developing incident response plans, identifying and containing threats, and performing incident response activities
Module #10 Security Information and Event Management (SIEM) Understanding SIEM systems, log analysis, and security monitoring
Module #11 Advanced Persistent Threats (APTs) and Nation-State Attacks Understanding APTs, nation-state attacks, and advanced threat actors
Module #12 Cloud Security Fundamentals Securing cloud infrastructure, including IaaS, PaaS, and SaaS models
Module #13 IoT Security Fundamentals Securing Internet of Things (IoT) devices and networks
Module #14 Artificial Intelligence and Machine Learning for Cyber Defense Understanding AI and ML applications in cyber defense, including anomaly detection and threat hunting
Module #15 Advanced Threat Hunting and Analysis Using threat intelligence, signature-based detection, and anomaly detection for threat hunting
Module #16 Cybersecurity Regulations and Compliance Understanding relevant regulations, including GDPR, HIPAA, and NIST, and ensuring compliance
Module #17 Cyber Defense Strategy and Planning Developing a comprehensive cyber defense strategy and plan
Module #18 Security Orchestration, Automation, and Response (SOAR) Understanding SOAR solutions and their role in incident response and threat management
Module #19 Advanced Network Defense Techniques Implementing advanced network defense techniques, including network segmentation and isolation
Module #20 Endpoint Detection and Response (EDR) Understanding EDR solutions and their role in endpoint security
Module #21 Deception Technology and Lures Using deception technology and lures to detect and respond to threats
Module #22 Security Analytics and Visualization Analyzing and visualizing security data to identify trends and threats
Module #23 Cyber Defense for Industrial Control Systems (ICS) Securing ICS and Operational Technology (OT) environments
Module #24 Cyber Defense for Critical Infrastructure Securing critical infrastructure, including power, water, and transportation systems
Module #25 Course Wrap-Up & Conclusion Planning next steps in Introduction to Advanced Cyber Defense career