Cyber Security
IQ Hub Cyber Security programme is beginner-friendly and project based. It is designed to help participants become job-ready
Get StartedCURRICULUM
Cyber Security Course Outline
Fundamentals
Introduction to Cybersecurity
By the end of the course, students should have a solid understanding of fundamental cybersecurity principles, networking concepts, and practical skills to address security challenges in real-world scenarios. They should be able to apply this knowledge to assess and mitigate cybersecurity risks effectively.
Module 1 & 2: Basics of Networking
- OSI and TCP/IP models
- IP addressing and subnetting
- Network protocols (DNS, DHCP, HTTP/S, FTP, etc.)
- Basic troubleshooting tools (ping, tracert, netstat)
- Introduction to network topologies and devices
Qualified Job Roles After Completion:
- Network Support Technician
- IT Support Specialist
- Help Desk Technician
Module 5: Network and Application Security
- Securing network devices and endpoints
- Cloud security fundamentals
- Web application vulnerabilities (OWASP Top 10)
- Incident response basics
Qualified Job Roles After Completion:
- Network Security Administrator
- Cloud Security Associate
- Application Security Analyst
Module 3: Introduction to Cybersecurity
- Principles: Confidentiality, Integrity, Availability (CIA)
- Threats and vulnerabilities (malware, phishing, ransomware)
- Risk management and mitigation techniques
- Cryptography basics (symmetric vs. asymmetric encryption, hashing)
Qualified Job Roles After Completion:
- Cybersecurity Analyst (Entry Level)
- IT Security Support Specialist
- Risk Analyst
Module 6: Penetration Testing Fundamentals
- Overview of the penetration testing lifecycle
- Legal and ethical considerations
- Lab setup: Kali Linux and key tools
- Reconnaissance: OSINT tools and techniques
Qualified Job Roles After Completion:
- Penetration Tester (Junior Level)
- Vulnerability Analyst
- Cybersecurity Technician
Module 4: Security Operations
- Authentication, Authorization, and Accounting (AAA)
- Access control models (DAC, MAC, RBAC)
- Security monitoring tools: SIEM, IDS/IPS
- Implementing organizational security policies
Qualified Job Roles After Completion:
- SOC Analyst (Level 1)
- Information Security Analyst
- Compliance Analyst
Module 7: Scanning and Vulnerability Analysis
- Network scanning tools (Nmap, Nessus)
- Identifying and analyzing vulnerabilities
- Common services and their weaknesses (SSH, FTP, SMB)
Qualified Job Roles After Completion:
- Vulnerability Management Analyst
- Security Consultant (Entry Level)
- SOC Analyst (Level 2)
Module 8: Exploitation and Gaining Access
- Introduction to Metasploit Framework
- Exploiting system vulnerabilities
- Cracking passwords and bypassing authentication
- Exploiting web applications with Burp Suite
Qualified Job Roles After Completion:
- Red Team Operator (Junior)
- Application Security Tester
- Exploit Developer (Entry Level)
Module 9: Post-Exploitation Tactics
- Privilege escalation techniques
- Lateral movement within networks
- Data exfiltration methods
- Maintaining access
Qualified Job Roles After Completion:
- Penetration Tester (Intermediate Level)
- Red Team Operator
- Ethical Hacker
Module 10: Finalizing the Penetration Test
- Covering tracks and avoiding detection
- Writing professional penetration testing reports
- Capstone project: Conducting a full penetration test on a simulated environment
- Presentation of findings and remediation strategies
Qualified Job Roles After Completion:
- Senior Penetration Tester
- Cybersecurity Consultant
- Offensive Security Specialist