Cybersecurity Analyst Program

Introduction to Cybersecurity Engineering

Get enrolled now

Week 1: Cybersecurity Fundamentals & Networking Basics

Day 1: Cybersecurity Fundamentals

• Key cybersecurity concepts: CIA Triad (Confidentiality, Integrity, Availability).
• Risk management, security policies, defense mechanisms (firewalls, encryption, IDS/IPS).
• Authentication, authorization, and access control basics.

Lab:

Tool: Use Wireshark (free tool) for basic network traffic capture.
Objective: Monitor and analyze network traffic, focusing on authentication and access control protocols.

Day 2: Threats, Vulnerabilities, and Risk Mitigation

• Understanding different types of threats and vulnerabilities.
• Risk mitigation strategies: Applying controls and defenses to protect systems.

Lab:

Tool: Kali Linux (free) for vulnerability scanning.
Objective: Use Nmap (free tool) for basic network vulnerability scanning.

Week 2: Networking Fundamentals

Day 1: Networking Basics

• Introduction to networking: TCP/IP stack, OSI model, DNS, HTTP, routing, and switching. 
• Network devices (routers, switches, firewalls) and their roles in security. 

Lab:

Tool: Cisco Packet Tracer (free for students, available through Cisco’s Networking Academy). 
Objective: Build and configure a network using routers and switches to understand how 
traffic flows and is secured. 

Day 2: Virtual Networking Labs

• Hands-on lab: Setting up subnets, routers, and firewalls using virtual machines. 

Lab:

Tool: VirtualBox (free) and pfSense (free open-source firewall). 
Objective: Configure firewalls and subnetting in a virtualized environment, ensuring traffic control and security. 

Week 3: Operating System Fundamentals (Linux & Windows)

Day 1: Linux Fundamentals

Linux command-line basics: File system, user management, permissions, process  management.
• Hands-on with tools like grep, ps, netstat.

Lab:

Tool: Kali Linux (free), Ubuntu (free).
Objective: Perform basic system management tasks and analyze processes using the command line.

Day 2: Windows Fundamentals

Windows OS basics: File system, registry, user/group management, and services.
Hands-on labs: Basic security configurations in Windows, user/group management, and event log analysis.

Lab:

Tool: Windows 10 (Free via Windows 10 Education or through Microsoft’s Virtual Labs).
Objective: Configure Windows security settings, perform user/group management, and analyze system logs.

Week 4: SIEM Fundamentals & Splunk (Free)

Day 1: Introduction to SIEM

• Overview of Security Information and Event Management (SIEM): Log aggregation, real-time monitoring, event correlation, and incident response.
• SIEM roles and use cases: Threat detection, compliance reporting, forensic analysis.

Lab:

Tool: Splunk Free (can use up to 500MB of data/day).
Objective: Install Splunk Free, configure log collection, and perform basic searches

Day 2: Virtual Networking Labs 

• Installing and configuring Splunk on a Linux VM: Forwarders, Indexers, and Search Heads.
• Introduction to Splunk Search Processing Language (SPL) for log search and analysis.

Lab:

Tool: Splunk Free (or ELK Stack if Splunk Free doesn't work for the lab setup).
Objective: Install Splunk Free, index data from Windows/Linux, and practice SPL searches.

Week 5: SIEM with Elastic Stack (Free)

Day 1: Splunk Labs

• Searching, filtering, and analyzing logs (e.g., syslog, Windows Event Logs).
• Creating custom dashboards and reports to visualize data and detect anomalies.

Lab:

Tool: Splunk Free (or ELK Stack).
Objective: Practice data analysis and create dashboards and alerts for common cybersecurity events.

Day 2: Introduction to Elastic Stack

• Introduction to Elastic Stack (Elasticsearch, Logstash, Kibana).
• Installation and configuration for centralized log collection and analysis with Kibana dashboards.

Lab:

Tool: Elastic Stack (Free Basic Tier).
Objective: Install and configure Elastic Stack, ingest data into Elasticsearch, and visualize logs with Kibana.

Week 6: Threat Intelligence & MITRE ATT&CK

Day 1: Threat Intelligence

• Types of threat intelligence: Strategic, tactical, operational, and technical intelligence.• Integrating threat intelligence feeds into your SIEM (Splunk/Elastic Stack).

Day 2: MITRE ATT&CK Framework

• Understanding MITRE ATT&CK: Tactics, Techniques, and Procedures (TTPs) of adversaries.
• Mapping real-world attacks (e.g., ransomware) to ATT&CK and configuring detection rules in your SIEM.

Lab:

Tool: Splunk Free or Elastic Stack.
Objective: Use MITRE ATT&CK framework to create detection rules and identify adversary Behaviors.

Week 7: Cyber Attacks, IOCs, and Incident Response

Day 1: Indicators of Compromise (IOCs) & Common Cyber Attacks


• Common cyberattacks (e.g., DDoS, phishing, malware) and attack vectors.
• What are IOCs (IP addresses, file hashes, domains)? Using IOCs for attack detection.
• Mapping attacks to MITRE ATT&CK and configuring SIEM alerts

Lab:

Tool: VirusTotal (free tool for analyzing IOCs).
Objective: Extract IOCs from malware samples and practice IOC detection with your SIEM

Day 2: Incident Response

• Handling security incidents: Detection, analysis, and response.
• Configuring SIEM systems to automate detection and responses for common attack scenarios.

Lab:

Tool: Splunk Free or Elastic Stack.
Objective: Simulate a cyberattack scenario and automate detection and response via SIEM rules and alerts.

Week 8: Ethical Hacking, Penetration Testing & Capstone

Day 1: Ethical Hacking & Penetration Testing


• Ethical hacking overview: Phases of testing, ethical guidelines, and legal considerations.
• Penetration testing tools overview: Kali Linux, Metasploit, Nmap, Wireshark.
• Mapping attacks to MITRE ATT&CK and configuring SIEM alerts

Lab:

Tool: Kali Linux (free).
Objective: Use Nmap for vulnerability scanning, Metasploit for exploitation, and Wireshark for traffic analysis.

Day 2: Project & Final Integration

• Implement a full SIEM solution (Splunk or Elastic Stack) with threat intelligence and IOCs.
• Simulated attack scenario: Detect and respond to attacks using MITRE ATT&CK.s.

Lab:

Tool: Splunk Free or Elastic Stack.
Objective: Implement a SIEM system, configure detection and response for a simulated attack, and present findings.

Week 8: Ethical Hacking, Penetration Testing & Capstone


• Throughout the course, students will have opportunities for practical labs and a project.
• Final assessment includes integrating the learned knowledge into a real-world SOC simulation and responding to a simulated cyberattack.