- 5 Sections
- 32 Lessons
- 5 Days
Expand all sectionsCollapse all sections
- DAY 1: Cybersecurity Essentials & the Threat LandscapeTools Introduced: Cyber Kill Chain | MITRE ATT&CK | Threat Intelligence Basics6
- 1.1Introduction to Cybersecurity: Global Trends & Challenges
- 1.2Types of Threats: Malware, Ransomware, Phishing, DDoS
- 1.3Anatomy of a Cyberattack: Understanding Attacker Tactics
- 1.4Case Study: Major Global Cyber Breaches
- 1.5Interactive Activity: Simulated Phishing Attack
- 1.6Group Discussion: “What’s at Stake in Your Industry?”
- DAY 2: Securing Systems, Networks & DevicesTools Introduced: Firewall Interfaces | Endpoint Detection (EDR) | VPNs | Network Mapping6
- DAY 3: Cyber Governance, Risk & ComplianceTools Introduced: Risk Matrix Builder | GRC Dashboards | Compliance Checklists6
- 3.1Overview of Cybersecurity Frameworks: NIST, ISO/IEC 27001
- 3.2GDPR, HIPAA, and Local Compliance Standards
- 3.3Cyber Risk Assessment and Quantification
- 3.4Designing a Cybersecurity Policy
- 3.5Hands-On Workshop: Build Your Org’s Risk Matrix
- 3.6Guest Speaker (optional): Industry Compliance Officer or Auditor
- DAY 4: Incident Response & Business ContinuityTools Introduced: SIEM Tools (Overview) | IR Templates | Forensics Lite Tools6
- 4.1Preparing for an Attack: IR Plans & Playbooks
- 4.2Detecting, Containing & Recovering from Incidents
- 4.3Communication During a Breach: Internal vs Public
- 4.4Hands-On Simulation: Live Cyber Incident Drill
- 4.5Tabletop Exercise: Role Play as an Incident Response Team
- 4.6Post-Incident Review: What Went Right, What Failed?
- DAY 5: Cyber Strategy & Practical CapstonePost-Course Roadmap: Certifications, Career Paths, Q & A8
- 5.1Building a Cybersecurity Strategy for Your Business
- 5.2Aligning Security with Organizational Goals
- 5.3Cyber Budgeting and Investment
- 5.4Capstone Project: Create a Cyber Strategy for a Hypothetical Company
- 5.5Final Presentations by Groups
- 5.6Feedback & Certification Ceremony
- 5.7Post-Course Roadmap: Certifications, Career Paths, & Further Study
- 5.8Q&A and Networking
Types of Threats: Malware, Ransomware, Phishing, DDoS
Next 