Cyber Security

IQ Hub Cyber Security programme is beginner-friendly and project based. It is designed to help participants become job-ready

Get Started

CURRICULUM

Cyber Security Course Outline

Fundamentals

Introduction to Cybersecurity

By the end of the course, students should have a solid understanding of fundamental cybersecurity principles, networking concepts, and practical skills to address security challenges in real-world scenarios. They should be able to apply this knowledge to assess and mitigate cybersecurity risks effectively.

Module 1 & 2: Basics of Networking
  • OSI and TCP/IP models
  • IP addressing and subnetting
  • Network protocols (DNS, DHCP, HTTP/S, FTP, etc.)
  • Basic troubleshooting tools (ping, tracert, netstat)
  • Introduction to network topologies and devices

Qualified Job Roles After Completion:

  • Network Support Technician
  • IT Support Specialist
  • Help Desk Technician
Module 5: Network and Application Security
  • Securing network devices and endpoints
  • Cloud security fundamentals
  • Web application vulnerabilities (OWASP Top 10)
  • Incident response basics

Qualified Job Roles After Completion:

  • Network Security Administrator
  • Cloud Security Associate
  • Application Security Analyst
Module 3: Introduction to Cybersecurity
  • Principles: Confidentiality, Integrity, Availability (CIA)
  • Threats and vulnerabilities (malware, phishing, ransomware)
  • Risk management and mitigation techniques
  • Cryptography basics (symmetric vs. asymmetric encryption, hashing)

Qualified Job Roles After Completion:

  • Cybersecurity Analyst (Entry Level)
  • IT Security Support Specialist
  • Risk Analyst
Module 6: Penetration Testing Fundamentals
  • Overview of the penetration testing lifecycle
  • Legal and ethical considerations
  • Lab setup: Kali Linux and key tools
  • Reconnaissance: OSINT tools and techniques

Qualified Job Roles After Completion:

  • Penetration Tester (Junior Level)
  • Vulnerability Analyst
  • Cybersecurity Technician
Module 4: Security Operations
  • Authentication, Authorization, and Accounting (AAA)
  • Access control models (DAC, MAC, RBAC)
  • Security monitoring tools: SIEM, IDS/IPS
  • Implementing organizational security policies

Qualified Job Roles After Completion:

  • SOC Analyst (Level 1)
  • Information Security Analyst
  • Compliance Analyst
Module 7: Scanning and Vulnerability Analysis
  • Network scanning tools (Nmap, Nessus)
  • Identifying and analyzing vulnerabilities
  • Common services and their weaknesses (SSH, FTP, SMB)

Qualified Job Roles After Completion:

  • Vulnerability Management Analyst
  • Security Consultant (Entry Level)
  • SOC Analyst (Level 2)
Module 8: Exploitation and Gaining Access
  • Introduction to Metasploit Framework
  • Exploiting system vulnerabilities
  • Cracking passwords and bypassing authentication
  • Exploiting web applications with Burp Suite

Qualified Job Roles After Completion:

  • Red Team Operator (Junior)
  • Application Security Tester
  • Exploit Developer (Entry Level)
Module 9: Post-Exploitation Tactics
  • Privilege escalation techniques
  • Lateral movement within networks
  • Data exfiltration methods
  • Maintaining access

Qualified Job Roles After Completion:

  • Penetration Tester (Intermediate Level)
  • Red Team Operator
  • Ethical Hacker
Module 10: Finalizing the Penetration Test
  • Covering tracks and avoiding detection
  • Writing professional penetration testing reports
  • Capstone project: Conducting a full penetration test on a simulated environment
  • Presentation of findings and remediation strategies

Qualified Job Roles After Completion:

  • Senior Penetration Tester
  • Cybersecurity Consultant
  • Offensive Security Specialist
whatsapp