
About Course
🔐 Cybersecurity for IT Professionals
Code: 8019-EC
⏳ Course Duration: 40 hours – Spread across 5 weeks
🏫 Presented by: Engineering Office for Technology and Software Services Academy
🎯 Target Audience
🧑💻 IT Professionals
Individuals responsible for managing and securing IT environments in organizations.
💻 System Administrators
Professionals who manage and maintain computer systems and networks.
🌐 Network Engineers
Engineers focused on configuring and securing network infrastructure.
🔒 Security Enthusiasts
Anyone interested in learning about cybersecurity principles and practices.
📘 What Will I Learn?
✅ Cybersecurity Fundamentals
Understand the basics of cybersecurity and its importance, including the CIA triad (Confidentiality, Integrity, Availability).
✅ Network Security Techniques
Learn to configure firewalls, VPNs, and Intrusion Detection/Prevention Systems (IDS/IPS) to secure networks.
✅ Threat Detection & Incident Response
Master tools and techniques for detecting cyber threats, responding to incidents, and conducting forensic analysis.
✅ Data Protection & Compliance
Understand data protection laws and regulations, and learn best practices for data encryption, backup, and disaster recovery.
✅ Advanced Cybersecurity Topics
Explore advanced topics like ethical hacking, penetration testing, threat intelligence, and combating advanced persistent threats (APTs).
✅ Incident Recovery and Forensics
Learn how to recover from security incidents and conduct vulnerability assessments and penetration tests.
📚 Course Modules
🔒 Module 1: Introduction to Cybersecurity (8 hours)
-
Basics of cybersecurity
-
Common types of cyber threats (malware, phishing, etc.)
-
Cybersecurity principles: CIA triad
-
Understanding encryption and firewalls
🌐 Module 2: Network Security (8 hours)
-
Protecting against DDoS and Man-in-the-middle attacks
-
Setting up firewalls and VPNs
-
Configuring IDS/IPS systems
-
Secure network protocols (SSH, SSL/TLS, etc.)
🛡️ Module 3: Threat Detection and Incident Response (8 hours)
-
Tools and techniques for cyber threat detection
-
Incident response strategies: detection, containment, recovery
-
Forensic analysis and vulnerability assessments
-
Penetration testing
🗂️ Module 4: Data Protection and Compliance (8 hours)
-
Data protection laws and regulations (GDPR, CCPA, etc.)
-
Best practices for data encryption and secure storage
-
Backup and disaster recovery planning
-
Secure access controls and identity management
⚔️ Module 5: Advanced Cybersecurity Topics (8 hours)
-
Security operations centers (SOC) and monitoring
-
Ethical hacking and penetration testing
-
Threat intelligence and analysis
-
Mitigating advanced persistent threats (APTs)
📦 Materials Included
📘 Printable Course Notes & Cheat Sheets
Comprehensive study guides and quick reference sheets.
🎥 Recorded Demonstrations & Practice Labs
Access to video tutorials and practical lab sessions.
🖥️ Configuration Scripts & Templates
Ready-to-use scripts for configuring network and security systems.
🔗 Access to Virtual Lab Environment
Cloud-based labs to practice configuring and securing environments.
📝 Weekly Quizzes and Final Assessment
Track your progress with quizzes and assessments throughout the course.
📜 Certificate of Completion
Earn a certificate upon successful course completion.
📝 Requirements / Instructions
💻 Personal Laptop or PC
A device with at least 8GB RAM and a stable internet connection.
🌐 Basic Knowledge of Computer Networks
Some familiarity with networking concepts such as IP addressing and routers.
🧠 Motivation to Learn
A keen interest in mastering cybersecurity and securing IT environments.
🛠️ Optional Tools
Tools like VirtualBox or VMware for local setups, but virtual labs will be provided.