Cyber Security

Full-stack development with Java and React involves building both the front-end using React/Angular and back-end of web applications using java spring base micro services - two powerful technologies

Course Outline

  • Introduction to Cybersecurity

    • Overview of Cybersecurity: History, importance, and current trends.

    • Basic Concepts: Confidentiality, Integrity, Availability (CIA Triad).

    • Cyber Threats and Attacks: Types of threats (malware, phishing, DDoS), real-world case studies.

  • Networking Fundamentals

    • Network Basics: OSI model, TCP/IP model.

    • Network Protocols: HTTP/HTTPS, FTP, SMTP, DNS.

    • IP Addressing and Subnetting: IPv4 vs IPv6, subnetting basics.

  • System and Network Security

    • Firewalls: Types, configurations, and rules.

    • Intrusion Detection and Prevention Systems (IDPS): Concepts and implementations.

    • Virtual Private Networks (VPNs): Protocols, setup, and security considerations.

    • Network Segmentation: VLANs, DMZs.

  • Operating Systems Security

    • Windows Security: User permissions, Group Policies, Windows Defender.

    • Linux Security: File permissions, SELinux, firewalls (iptables, nftables).

    • Patch Management: Importance, tools, and practices.

  • Cryptography

    • Encryption Basics: Symmetric vs asymmetric encryption.

    • Cryptographic Algorithms: AES, RSA, ECC.

    • Hash Functions: MD5, SHA-1, SHA-256.

    • Public Key Infrastructure (PKI): Certificates, certificate authorities (CAs).

  • Risk Management and Compliance

    • Risk Assessment: Identifying, assessing, and mitigating risks.

    • Compliance Frameworks: GDPR, HIPAA, PCI-DSS, ISO 27001.

    • Incident Response: Preparing for, detecting, and responding to incidents.

  • Ethical Hacking and Penetration Testing

    • Ethical Hacking Principles: Legal and ethical considerations.

    • Penetration Testing Phases: Reconnaissance, scanning, exploitation, reporting.

    • Tools and Techniques: Nmap, Metasploit, Burp Suite.

  • Security Operations

    • Security Information and Event Management (SIEM): Concepts and tools.

    • Log Management: Collection, analysis, and correlation of logs.

    • Threat Hunting: Techniques and tools for proactive threat detection.

  • Application Security

    • Secure Software Development Lifecycle (SDLC): Principles and practices.

    • Common Vulnerabilities: OWASP Top Ten, SQL Injection, XSS.

    • Secure Coding Practices: Input validation, error handling.

  • Emerging Topics and Advanced Concepts

    • Cloud Security: Cloud computing models, security best practices for AWS, Azure, Google Cloud.

    • Internet of Things (IoT) Security: Challenges and solutions.

    • Artificial Intelligence and Machine Learning in Security: Applications and implications.

  • Practical Labs and Hands-On Experience

    • Lab Environment Setup: Virtual machines, lab software.

    • Simulated Attacks: Safe environments for testing and learning.

    • Case Studies: Real-world scenarios and hands-on exercises.

  • Career Development and Soft Skills

    • Certifications: CISSP, CEH, CompTIA Security+, etc.

    • Resume Building: Crafting a cybersecurity-focused resume.

    • Interview Preparation: Common questions and scenarios.

Course duration

The course will be held twice a week, with each session lasting 2 hours, over a period of 14-16 weeks. Content will be delivered via Zoom or Microsoft Teams.