Learn security principles and threat protection
240
Sub Topics
762
MCQs
404
MCOs
574
True/False
317
Fill Blanks
116
Rearrange
290
Matching
151
Comprehensions
279
Flashcard Decks
Curriculum
What You'll Learn
01 Introduction to Cybersecurity 4 topics
1 Fundamentals of Cybersecurity
- Definition and Importance
- History and Evolution of Cybersecurity
- Current Threat Landscape
2 Cybersecurity Principles
- CIA Triad
- Defense in Depth
- Principle of Least Privilege
3 Cybersecurity Domains
- Network Security
- Application Security
- Information Security
- Operational Security
- Physical Security
4 Cybersecurity Careers and Roles
- Security Analyst
- Security Engineer
- Penetration Tester
- Security Architect
- Chief Information Security Officer
02 Cyber Threats and Vulnerabilities 4 topics
1 Types of Cyber Threats
- Malware
- Social Engineering
- Advanced Persistent Threats
- Zero-day Exploits
2 Attack Vectors
- Email and Phishing
- Web-based Attacks
- Network-based Attacks
- Physical Access
3 Vulnerability Management
- Vulnerability Assessment
- Vulnerability Scanning Tools
- Vulnerability Classification
- Remediation Strategies
4 Threat Intelligence
- Sources of Threat Intelligence
- Threat Intelligence Platforms
- Threat Hunting
- Indicators of Compromise
03 Network Security 4 topics
1 Network Fundamentals
- OSI Model and TCP/IP
- Network Protocols and Ports
- Network Architecture
2 Network Security Controls
- Firewalls and Types
- Intrusion Detection/Prevention Systems
- Network Access Control
- Virtual Private Networks
3 Network Monitoring and Analysis
- Network Traffic Analysis
- Packet Capture and Analysis
- NetFlow Analysis
- Network Baselining
4 Wireless Network Security
- WiFi Security Protocols
- Bluetooth Security
- Wireless Attacks and Countermeasures
- Rogue Access Points Detection
04 Authentication and Access Control 4 topics
1 Identity and Access Management
- Identity Lifecycle Management
- Role-Based Access Control
- Attribute-Based Access Control
- Privileged Access Management
2 Authentication Methods
- Passwords and Password Policies
- Multi-Factor Authentication
- Biometric Authentication
- Single Sign-On and Federation
3 Authorization Systems
- Access Control Lists
- Centralized Authorization
- OAuth and OpenID Connect
- Zero Trust Architecture
4 Identity Governance
- Access Certification and Reviews
- Segregation of Duties
- User Activity Monitoring
- Compliance Reporting
05 Cryptography 4 topics
1 Cryptographic Fundamentals
- History of Cryptography
- Encryption, Decryption, and Hashing
- Symmetric vs. Asymmetric Cryptography
- Cryptographic Primitives
2 Symmetric Encryption
- Block Ciphers
- Stream Ciphers
- Modes of Operation
- Key Management
3 Asymmetric Encryption
- RSA Algorithm
- Elliptic Curve Cryptography
- Diffie-Hellman Key Exchange
- Digital Signatures
4 Cryptographic Applications
- Transport Layer Security
- Public Key Infrastructure
- Secure Email
- Blockchain and Cryptocurrencies
06 Operating System Security 4 topics
1 OS Security Fundamentals
- OS Architecture and Security Models
- Kernel Security
- User Space vs. Kernel Space
- Security by Design Principles
2 Windows Security
- Windows Security Architecture
- Group Policy and Active Directory
- Windows Defender and Security Baselines
- Windows Event Logging and Monitoring
3 Linux/Unix Security
- Linux Security Modules
- File Permissions and Access Controls
- SELinux and AppArmor
- Secure Configuration Best Practices
4 Endpoint Protection
- Anti-malware Solutions
- Host-based Firewalls
- Endpoint Detection and Response
- Application Whitelisting
07 Application Security 4 topics
1 Secure Software Development Lifecycle
- Security Requirements
- Threat Modeling
- Secure Coding Practices
- Security Testing
2 Web Application Security
- OWASP Top 10 Vulnerabilities
- Cross-Site Scripting
- SQL Injection
- Cross-Site Request Forgery
3 Mobile Application Security
- Android vs. iOS Security Models
- App Permissions and Sandboxing
- Mobile Application Threats
- Secure Mobile Development
4 API Security
- API Authentication and Authorization
- API Gateways
- Common API Vulnerabilities
- API Security Best Practices
08 Cloud Security 4 topics
1 Cloud Computing Fundamentals
- Service Models
- Deployment Models
- Cloud Architecture
- Shared Responsibility Model
2 Cloud Security Challenges
- Data Protection in the Cloud
- Identity and Access Management
- Cloud Misconfigurations
- Multi-tenancy Risks
3 Securing Cloud Infrastructure
- Virtual Network Security
- Container Security
- Serverless Security
- Cloud Storage Security
4 Cloud Security Best Practices
- Cloud Security Posture Management
- Security as Code
- Cloud Compliance Frameworks
- Cloud Security Monitoring
09 Security Operations 4 topics
1 Security Operations Center
- SOC Organization and Roles
- SOC Maturity Models
- SOC Technologies and Tools
- SOC Metrics and KPIs
2 Security Information and Event Management
- Log Collection and Normalization
- Correlation Rules
- Alerting and Case Management
- SOAR Integration
3 Incident Response
- Incident Response Planning
- Incident Detection and Analysis
- Incident Containment and Eradication
- Recovery and Lessons Learned
4 Digital Forensics
- Forensic Principles and Procedures
- Evidence Collection and Handling
- Disk Forensics
- Memory Forensics
- Network Forensics
10 Risk Management and Compliance 4 topics
1 Information Security Risk Management
- Risk Assessment Methodologies
- Threat and Vulnerability Assessment
- Risk Treatment Options
- Risk Monitoring and Review
2 Security Frameworks and Standards
- ISO 27001/27002
- NIST Cybersecurity Framework
- CIS Controls
- COBIT
3 Regulatory Compliance
- GDPR
- HIPAA
- PCI DSS
- SOX
4 Security Metrics and Reporting
- Key Performance Indicators
- Key Risk Indicators
- Security Dashboards
- Executive Reporting
11 Data Security and Privacy 4 topics
1 Data Classification and Handling
- Data Classification Schemes
- Data Labeling and Tagging
- Data Handling Procedures
- Data Lifecycle Management
2 Data Protection Techniques
- Data Loss Prevention
- Database Security
- File and Disk Encryption
- Digital Rights Management
3 Privacy Frameworks
- Privacy by Design
- Privacy Impact Assessments
- Privacy Enhancing Technologies
- International Privacy Laws
4 Data Breach Management
- Data Breach Detection
- Breach Notification Requirements
- Data Breach Response
- Recovery and Remediation
12 Physical and Environmental Security 4 topics
1 Physical Security Controls
- Perimeter Security
- Building Access Controls
- Surveillance Systems
- Physical Security Zones
2 Data Center Security
- Data Center Design and Architecture
- Environmental Controls
- Fire Prevention and Suppression
- Power Management
3 Personnel Security
- Background Checks
- Security Awareness Training
- Social Engineering Countermeasures
- Insider Threat Management
4 Business Continuity and Disaster Recovery
- Business Impact Analysis
- Continuity Planning
- Disaster Recovery Strategies
- Testing and Exercises
13 Advanced Threat Defense 4 topics
1 Advanced Malware Analysis
- Static Analysis Techniques
- Dynamic Analysis and Sandboxing
- Reverse Engineering Malware
- Malware Evasion Techniques
2 Threat Hunting
- Threat Hunting Methodologies
- Hunting Tools and Technologies
- Hypothesis-Based Hunting
- Threat Hunting Metrics
3 Deception Technologies
- Honeypots and Honeynets
- Deception Networks
- Canary Tokens
- Adversary Engagement
4 Cyber Threat Intelligence
- Strategic vs. Tactical Intelligence
- Intelligence Collection and Analysis
- Threat Actor Profiling
- Intelligence-Driven Defense
14 Offensive Security 4 topics
1 Ethical Hacking Fundamentals
- Methodology and Approach
- Legal and Ethical Considerations
- Scoping and Rules of Engagement
- Documentation and Reporting
2 Reconnaissance Techniques
- OSINT
- Network Scanning
- Enumeration
- Social Engineering
3 Vulnerability Assessment and Exploitation
- Vulnerability Scanners
- Exploit Development
- Metasploit Framework
- Post-Exploitation Activities
4 Security Testing Types
- Penetration Testing
- Red Team Operations
- Bug Bounty Programs
- Purple Team Exercises
15 Emerging Technologies and Future Trends 4 topics
1 Artificial Intelligence in Cybersecurity
- Machine Learning for Threat Detection
- AI-Powered Attacks
- Adversarial Machine Learning
- Automated Security Orchestration
2 IoT Security
- IoT Architecture and Vulnerabilities
- IoT Security Frameworks
- Securing IoT Devices
- IoT Threat Modeling
3 Quantum Computing and Cryptography
- Quantum Computing Basics
- Post-Quantum Cryptography
- Quantum Key Distribution
- Preparing for Quantum Threats
4 Future of Cybersecurity
- Evolving Threat Landscape
- Security Automation and Orchestration
- Zero Trust Evolution
- Human-Machine Teaming
Explore More
Cybersecurity
Get it on Google Play