Cyber Security

The internet never sleeps — and neither do cyber threats. Our Cyber Security course at Academy of Tech Masters is designed to prepare you to defend against hackers, breaches, and data theft with hands-on tools, real-time simulations, and industry-proven techniques.

Cyber Security Course Curriculum

It stretches your mind, think better and create even better.

Foundations of Cyber Security

Topics:

  • What is Cyber Security?
  • CIA Triad (Confidentiality, Integrity, Availability)
  • Cyber Threat Landscape & Attack Vectors
  • Careers & Roles in Cyber Security

Topics:

  • OSI & TCP/IP Models
  • IP Addressing & Subnetting
  • Common Protocols (HTTP, FTP, DNS, SMTP)
  • Windows & Linux Security Fundamentals
  • File Systems & Permissions

Threats, Attacks & Vulnerabilities

Topics:

  • Malware (Viruses, Worms, Trojans, Ransomware)
  • Phishing & Social Engineering
  • Denial of Service (DoS/DDoS)
  • Insider Threats

Topics:

  • OWASP Top 10 Vulnerabilities
  • SQL Injection & XSS Attacks
  • CSRF & Command Injection
  • Secure Coding Practices

Topics:

  • Vulnerability Scanning
  • Penetration Testing Basics
  • Exploitation Techniques
  • Risk Assessment & Reporting

Cryptography & Secure Communications

Topics:

  • Symmetric & Asymmetric Encryption
  • Hash Functions (MD5, SHA)
  • Digital Signatures & Certificates

Topics:

  • SSL/TLS & HTTPS
  • VPN & IPSec
  • SSH & Secure Email Protocols
  • Public Key Infrastructure (PKI)

Security Operations & Tools

Topics:

  • Incident Response Lifecycle
  • SIEM (Security Information and Event Management)
  • Log Analysis & Monitoring
  • Threat Intelligence

Topics:

  • Wireshark for Packet Analysis
  • Nmap for Network Scanning
  • Metasploit for Penetration Testing
  • Snort/Suricata for IDS/IPS

Topics:

  • Firewalls & Antivirus Solutions
  • Intrusion Detection & Prevention
  • Endpoint Detection & Response (EDR)
  • Secure Remote Access (VPNs)

Advanced Cyber Security Domains

Topics:

  • Reconnaissance & Footprinting
  • Exploitation & Privilege Escalation
  • Web Application Testing
  • Post-Exploitation & Reporting

Topics:

  • Cloud Security Models (IaaS, PaaS, SaaS)
  • AWS, Azure & GCP Security Basics
  • IoT Security Challenges & Solutions
  • Zero Trust Architecture

Topics:

  • Digital Forensics Process
  • Evidence Collection & Chain of Custody
  • Incident Response Planning
  • Disaster Recovery

Governance, Risk & Compliance (GRC)

Topics:

  • ISO 27001, NIST, CIS Controls
  • Security Policy Development
  • Business Continuity Planning

Topics:

  • GDPR, HIPAA, PCI DSS
  • Data Protection & Privacy Laws
  • Cybercrime Laws & Regulations
Free
Free access this course

A course by

Tags