Professional Cyber Security Fundamentals
Professional Cyber Security Fundamentals
Beginner
Tk. 6,500
![](https://devskillpublicfiles.s3.ap-southeast-1.amazonaws.com/uploads/websiteimages/coursecontents/wkmiud30stk.png)
Who Can Join This Course?
Corei5 with 8 GB RAM, A very good user of Windows O/S, and A strong determination to spend 10 hours of study time per week.
Course Outline
Introduction to Cyber Security
● Overview of IT Security & Cyber Security
● Career Track detail discussion & course outcome.
● Cybersecurity various terminologies
Lab Setup for Cyber Security Attack Simulation
● Why do we need virtualization?
● Setup of VirtualBox, Kali Linux, Metasploit, WinXP, Win10 and others
● Various tools required for cybersecurity
Linux Fundamentals required for IT Security
● Linux basic commands
● Files & directory structures
● Users and privileges
● Services
● How to use them effectively
Networking Fundamentals
● Basic network components
● Network protocols
● OSI Model & Three-way Handshake
Python Fundamentals required for IT Security
● Variables
● Strings
● Conditional Statements
● Operators & Maths
● Functions
● Loops
● List
● File Operation
Cybersecurity Tools & Applications
● NMAP
● Metasploit
● Process Hacker
● Network Miner
● Others
Hacking Phases - Reconnaissance & Footprinting
● Overview, Tools & Techniques,
● Passive and Active Recon
● Scanning & Enumeration (How to interact with online LAB)
Introduction to Malware Analysis
● Malware Analysis Fundamentals
● How to prepare your own sandbox for testing
● How to analyse using online sandboxes
Introduction to Vulnerability Management & Web Pen Testing
● NMAP & other Tools & Techniques
● Pen Testing simulation lab
● Pen Test Report Sample
● Nmap, Nikto and other open-source tools.
SOC Fundamentals
● Incident Analysis, Response and Triage
● Detail discussion of phases
● Tools & Techniques
● Discussion about various real-life scenarios
Security Information and Event Management (SIEM)
● Introduction to various SIEM solutions
● Introduction to Splunk ( with free Certification )
● Wazuh Fundamentals
Effective use of Linked profile
● Why we need a strong LinkedIn profile
● How to maintain and use most of it.
Job Interview Preperation
● How to write an effective cybersecurity-focused resume
● Mock interview
Next Step for Intermediate to Advanced Cybersecurity
● What resources to follow
● How to proceed with self-study
Instructors
![](https://s3.ap-southeast-1.amazonaws.com/devskillfiles/uploads/profileimages/44kqrzm1vrl.jpg?X-Amz-Expires=36000&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAUHD2NJ7BTT2REWBG/20240727/ap-southeast-1/s3/aws4_request&X-Amz-Date=20240727T030139Z&X-Amz-SignedHeaders=host&X-Amz-Signature=34127f3b093ff4b3f53dfd757cfa4213c5c33a997dd47726e3a12dfa2f69f097)
Working as a Cyber Security Analyst (SOC Analyst/Incident Responder) in the Security Operation Center (SOC) at a multinational IT Company, Melbourne, Australia.
LinkedIn ProfileWhat Students Said
This course is a great way to get started in cyber security. The instructor is very knowledgeable and experienced in the field of Cyber Security. He can convey concepts in a very clear and concise manner. The course is very well organized and the material is presented in a very logical manner. I would highly recommend this course to anyone interested in learning about Cyber Security.
![MD. TANBIR AHMED](https://s3.ap-southeast-1.amazonaws.com/devskillfiles/uploads/profileimages/hoaz0iedrtv.png?X-Amz-Expires=36000&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAUHD2NJ7BTT2REWBG/20240727/ap-southeast-1/s3/aws4_request&X-Amz-Date=20240727T030139Z&X-Amz-SignedHeaders=host&X-Amz-Signature=3a9115ebe3c5a654e3d5904a92e72fab746a9f0ad01596c44a06778e3cd8a173)
Professional Cyber Security Fundamentals Batch: 1
The course was well organized. Didn't know ABC of cyber security before enrolling this course. Special thanks to instrauctor Mr. Moshihoor Rahman, he is very helpful during this course.
![Jahir Raihan](https://s3.ap-southeast-1.amazonaws.com/devskillfiles/uploads/profileimages/3wijopb1wh0.jpg?X-Amz-Expires=36000&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAUHD2NJ7BTT2REWBG/20240727/ap-southeast-1/s3/aws4_request&X-Amz-Date=20240727T030139Z&X-Amz-SignedHeaders=host&X-Amz-Signature=6094732fb6c1871b963129446f19ec0838d5d857b3da040e050f5b4564c65da1)
Professional Cyber Security Fundamentals Batch: 1
Alhamdulillah, now, I can find myself as an enthusiast on Cybersecurity. I have learnt a lot, and, enjoyed structured sessions. Instructor, Mashihoor Sir, is very talented, professional and helpful. If someone wants to start career in cybersec, then, I am highly recommending this course. Thanks
![Apel Mahmud](https://s3.ap-southeast-1.amazonaws.com/devskillfiles/uploads/profileimages/clkjomrqwbr.jpg?X-Amz-Expires=36000&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAUHD2NJ7BTT2REWBG/20240727/ap-southeast-1/s3/aws4_request&X-Amz-Date=20240727T030139Z&X-Amz-SignedHeaders=host&X-Amz-Signature=6fb89b90add5ef789ceb0df14f9298edf3f357ba2ff848e1ce6b28c2a5585bcf)
Professional Cyber Security Fundamentals Batch: 1
This course is student-friendly. As well as the instructor is amazing. There are plenty of institutes that provide similar kinds of courses, but I can say without any doubt whoever takes this course won't regret it. Teaching strategy, support, and guidance are beyond my speech. Hats off to Devskill for this amazing combo.
![Mohammad Sabbir Ahmed](https://s3.ap-southeast-1.amazonaws.com/devskillfiles/uploads/profileimages/idoxqtgyhjj.jpeg?X-Amz-Expires=36000&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAUHD2NJ7BTT2REWBG/20240727/ap-southeast-1/s3/aws4_request&X-Amz-Date=20240727T030139Z&X-Amz-SignedHeaders=host&X-Amz-Signature=f4a81f4a19585fba11b4a01aa6d3c879eef68f0662689b482a776980c2e0d95a)
Professional Cyber Security Fundamentals Batch: 1
This course was very informative and very helpful for me. I enjoyed the course and learned a lot from it. The content is well organised and focused on practical lab simulations.
Professional Cyber Security Fundamentals Batch: 1