Cybersecurity Fundamentals
Definition and Scope of Cybersecurity31Cybersecurity Threats and Vulnerabilities29Cybersecurity Best Practices30Network Security Concepts23Network Security Threats and Countermeasures23Network Security Tools and Techniques22Operating System Security Concepts28Operating System Security Threats and Countermeasures24Operating System Security Tools and Techniques23Application Security Concepts23Application Security Threats and Countermeasures26Application Security Tools and Techniques28Cloud Security Concepts28Cloud Security Threats and Countermeasures20Cloud Security Tools and Techniques22Cybersecurity Laws and Regulations28Cybersecurity Ethics26Cybersecurity Incident Response26
Network Security
Introduction to Network Security30Network Security Models26Security Protocols31Malware and Viruses24Hacking and Intrusion Detection25Denial of Service Attacks24Firewall Configuration23Intrusion Detection and Prevention Systems25Virtual Private Networks23Security Policy Development28Security Monitoring and Auditing27Incident Response and Recovery22
Ethical Hacking
Definition and Scope of Ethical Hacking29Ethical Principles and Legal Considerations23Tools and Techniques for Ethical Hacking29Vulnerability Scanning and Assessment28Penetration Testing Techniques24Reporting and Remediation24Social Engineering Techniques28Human Factors in Cybersecurity29Network Security Concepts22Network Defense Techniques24Incident Response and Recovery23Cloud Security Considerations23Emerging Technologies and Cybersecurity25
Cloud Security
Definition and Scope of Cloud Security27Cloud Security Architecture23Cloud Security Threats and Vulnerabilities26IAM Principles and Best Practices28Cloud IAM Services23IAM for Cloud Applications22Data Encryption and Key Management26Data Loss Prevention (DLP)24Data Backup and Recovery24Cloud Network Architecture24Cloud Firewall and Intrusion Detection Systems (IDS)31Cloud Virtual Private Networks (VPNs)29Cloud Security Standards and Regulations28Cloud Security Auditing22Cloud Security Compliance Reporting22
Incident Response
Introduction to Incident Response24Incident Detection and Analysis29Incident Containment and Eradication26Incident Recovery and Restoration29Incident Reporting and Communication30Incident Response Plan Development22Incident Response Team Training and Exercises25Collaboration and Coordination22Threat Hunting and Intelligence Gathering22Digital Forensics and Incident Investigation25Incident Response Automation and Orchestration22
Cybersecurity Law and Policy
Overview of Cybersecurity Law and Policy25International Cybersecurity Law and Policy24National Cybersecurity Law and Policy28Cybersecurity Risk Assessment and Management23Cybersecurity Compliance25Cybersecurity Incident Response Planning29Cybersecurity Incident Investigation22Ethical Considerations in Cybersecurity22Privacy Law and Cybersecurity22
Cybersecurity Management
Introduction to Cybersecurity Management27Cybersecurity Risk Assessment and Management22Cybersecurity Policies and Procedures27Cybersecurity Governance Frameworks22Cybersecurity Compliance Requirements28Cybersecurity Auditing and Reporting29Incident Response Planning and Procedures26Incident Detection and Analysis22Incident Containment and Recovery22Firewalls and Intrusion Detection Systems25Antivirus and Anti-Malware Software30Security Information and Event Management (SIEM) Systems26Secure Software Development Practices29Password Management and Authentication22Employee Cybersecurity Awareness and Training30