๐ Fundamentals of Cybersecurity
Introduction to Cybersecurity
Importance of Cybersecurity in the Digital Age
Common Types of Cyber Threats (Malware, Phishing, Ransomware, etc.)
Cybersecurity Terminologies and Concepts
Roles and Career Paths in Cybersecurity
The CIA Triad: Confidentiality, Integrity, Availability
Overview of Cyber Laws and Ethical Responsibilities
Risk Management & Cyber Hygiene
๐ง Network Security & Encryption
Basics of Networking (LAN, WAN, TCP/IP, DNS, etc.)
Types of Network Attacks (DoS, ManintheMiddle, etc.)
Firewalls, VPNs, and IDS/IPS
Wireless Security and WiFi Threats
Cryptography Basics: Symmetric vs Asymmetric Encryption
SSL/TLS, Public Key Infrastructure (PKI)
Email and Web Security
Secure Network Design Principles
โ๏ธ Ethical Hacking Basics & Firewalls
Introduction to Ethical Hacking
Legal and Ethical Aspects of Hacking
Phases of Ethical Hacking (Reconnaissance, Scanning, Gaining Access, etc.)
Common Hacking Tools (Kali Linux, Metasploit, Wireshark)
Vulnerability Assessment & Penetration Testing
Firewall Configuration and Management
Intrusion Detection & Prevention Systems (IDS/IPS)
Social Engineering & Insider Threats
๐งช Practical Labs and Capstone Project
Setting up a Virtual Lab using VirtualBox or VMware
Handson Exercises on:
Packet sniffing
Network scanning (Nmap)
Password cracking basics
Simulated attacks and defenses
Mini Projects:
Create a secure home/office network
Build a basic firewall policy
Perform a mock vulnerability scan
Capstone Project: Simulate a realworld cyber attack and defense plan (team or solo)
๐ Assessment & Certification
Weekly Quizzes and Lab Submissions
Final Exam (Theory & Practical)
Capstone Project Presentation
Digital Certificate Upon Completion