Core cybersecurity principles: CIA triad, AAA model, threat types, and risk modeling
Security policies, compliance frameworks(e.g., NIST, HIPAA, GDPR), and governance.
Secure coding practices and OWASP Top 10 vulnerabilities.
Ethical hacking tools and attack simulation techniques
Digital forensics methodology and legal considerations.
Threat detection and vulnerability assessment.
Reporting and communication for stakeholders.
Virtualizing system and networks.
System hardening (Windows/Linux).
System / OS administration.
Network device security.
Master communications, collaboration, and problem-solving skills required for modern tech roles.
Practical experience in professional environments via mock interviews and real-world scenarios.
Learn how to effectively present and collaborate in team environments.
To succeed in this course, students should have the following foundational knowledge and skills: