Cybersecurity Analyst Program
Introduction to Cybersecurity Engineering
Get enrolled now• Key cybersecurity concepts: CIA Triad (Confidentiality, Integrity, Availability).
• Risk management, security policies, defense mechanisms (firewalls, encryption, IDS/IPS).
• Authentication, authorization, and access control basics.
• Tool: Use Wireshark (free tool) for basic network traffic capture.
• Objective: Monitor and analyze network traffic, focusing on authentication and access control protocols.
• Understanding different types of threats and vulnerabilities.
• Risk mitigation strategies: Applying controls and defenses to protect systems.
• Tool: Kali Linux (free) for vulnerability scanning.
• Objective: Use Nmap (free tool) for basic network vulnerability scanning.
• Introduction to networking: TCP/IP stack, OSI model, DNS, HTTP, routing, and switching.
• Network devices (routers, switches, firewalls) and their roles in security.
• Tool: Cisco Packet Tracer (free for students, available through Cisco’s Networking Academy).
• Objective: Build and configure a network using routers and switches to understand how
traffic flows and is secured.
• Hands-on lab: Setting up subnets, routers, and firewalls using virtual machines.
• Tool: VirtualBox (free) and pfSense (free open-source firewall).
• Objective: Configure firewalls and subnetting in a virtualized environment, ensuring traffic control and security.
• Linux command-line basics: File system, user management, permissions, process management.
• Hands-on with tools like grep, ps, netstat.
• Tool: Kali Linux (free), Ubuntu (free).
• Objective: Perform basic system management tasks and analyze processes using the command line.
• Windows OS basics: File system, registry, user/group management, and services.
• Hands-on labs: Basic security configurations in Windows, user/group management, and event log analysis.
• Tool: Windows 10 (Free via Windows 10 Education or through Microsoft’s Virtual Labs).
• Objective: Configure Windows security settings, perform user/group management, and analyze system logs.
• Overview of Security Information and Event Management (SIEM): Log aggregation, real-time monitoring, event correlation, and incident response.
• SIEM roles and use cases: Threat detection, compliance reporting, forensic analysis.
• Tool: Splunk Free (can use up to 500MB of data/day).
• Objective: Install Splunk Free, configure log collection, and perform basic searches
• Installing and configuring Splunk on a Linux VM: Forwarders, Indexers, and Search Heads.
• Introduction to Splunk Search Processing Language (SPL) for log search and analysis.
• Tool: Splunk Free (or ELK Stack if Splunk Free doesn't work for the lab setup).
• Objective: Install Splunk Free, index data from Windows/Linux, and practice SPL searches.
• Searching, filtering, and analyzing logs (e.g., syslog, Windows Event Logs).
• Creating custom dashboards and reports to visualize data and detect anomalies.
• Tool: Splunk Free (or ELK Stack).
• Objective: Practice data analysis and create dashboards and alerts for common cybersecurity events.
• Introduction to Elastic Stack (Elasticsearch, Logstash, Kibana).
• Installation and configuration for centralized log collection and analysis with Kibana dashboards.
• Tool: Elastic Stack (Free Basic Tier).
• Objective: Install and configure Elastic Stack, ingest data into Elasticsearch, and visualize logs with Kibana.
• Types of threat intelligence: Strategic, tactical, operational, and technical intelligence.• Integrating threat intelligence feeds into your SIEM (Splunk/Elastic Stack).
• Understanding MITRE ATT&CK: Tactics, Techniques, and Procedures (TTPs) of adversaries.
• Mapping real-world attacks (e.g., ransomware) to ATT&CK and configuring detection rules in your SIEM.
• Tool: Splunk Free or Elastic Stack.
• Objective: Use MITRE ATT&CK framework to create detection rules and identify adversary Behaviors.
• Common cyberattacks (e.g., DDoS, phishing, malware) and attack vectors.
• What are IOCs (IP addresses, file hashes, domains)? Using IOCs for attack detection.
• Mapping attacks to MITRE ATT&CK and configuring SIEM alerts
• Tool: VirusTotal (free tool for analyzing IOCs).
• Objective: Extract IOCs from malware samples and practice IOC detection with your SIEM
• Handling security incidents: Detection, analysis, and response.
• Configuring SIEM systems to automate detection and responses for common attack scenarios.
• Tool: Splunk Free or Elastic Stack.
• Objective: Simulate a cyberattack scenario and automate detection and response via SIEM rules and alerts.
• Ethical hacking overview: Phases of testing, ethical guidelines, and legal considerations.
• Penetration testing tools overview: Kali Linux, Metasploit, Nmap, Wireshark.
• Mapping attacks to MITRE ATT&CK and configuring SIEM alerts
• Tool: Kali Linux (free).
• Objective: Use Nmap for vulnerability scanning, Metasploit for exploitation, and Wireshark for traffic analysis.
• Implement a full SIEM solution (Splunk or Elastic Stack) with threat intelligence and IOCs.
• Simulated attack scenario: Detect and respond to attacks using MITRE ATT&CK.s.
• Tool: Splunk Free or Elastic Stack.
• Objective: Implement a SIEM system, configure detection and response for a simulated attack, and present findings.
• Throughout the course, students will have opportunities for practical labs and a project.
• Final assessment includes integrating the learned knowledge into a real-world SOC simulation and responding to a simulated cyberattack.