Module 1: Introduction to Cybersecurity
- Understanding the cybersecurity landscape: threats, vulnerabilities, and attack vectors.
- The importance of cybersecurity for individuals and organizations.
- Introduction to the CIA triad (Confidentiality, Integrity, Availability) in cybersecurity
Module 2: Core Security Concepts
- Network security fundamentals: TCP/IP, network protocols, and network devices.
- Operating system security concepts: user accounts, permissions, and access control.
- Cryptography basics: encryption, decryption, and key management.
Module 3: Cybersecurity Threats and Attacks
- Demystifying common cyber threats: Malware (viruses, worms, ransomware).
- Exploring social engineering tactics and phishing scams.
- Understanding network security vulnerabilities and attack vectors (DoS, SQL injection).
Module 4: Cybersecurity Best Practices and Controls
- Implementing preventative security measures: firewalls, intrusion detection systems (IDS), and anti-malware software.
- Network segmentation and access control for improved security.
- Importance of strong passwords, multi-factor authentication (MFA), and secure configurations.
Module 5: User Security Awareness
- Identifying phishing attempts and social engineering tactics.
- Safe browsing practices and secure online habits.
- Securing personal devices and online accounts.
Module 6: Data Storytelling (The Power of Narrative)
- Explain the art of data storytelling: crafting a narrative using data to engage the audience and influence decisions.
- Discuss the key elements of a compelling data story (context, evidence, insights, recommendations).
- Cover effective communication techniques for presenting data insights clearly and concisely.
Activities:
- Interactive exercises on identifying the elements of a strong data story.
- Group projects on developing data stories from provided datasets.
- Peer-review sessions on refining data storytelling techniques.
Module 7: Network Security
- Firewalls: configurations, types (stateful, packet filtering), and advanced features.
- Intrusion Detection/Prevention Systems (IDS/IPS): functionalities and deployment strategies.
- Wireless network security: securing Wi-Fi networks and access points (WPA2, WPA3).
Module 8: System and Application Security
- Operating system hardening: securing user accounts, permissions, and system configurations.
- Application security best practices: secure coding principles and vulnerabilities.
- Secure coding fundamentals (optional): common vulnerabilities and coding practices for mitigation
Module 9: Incident Response and Recovery
- Developing a cybersecurity incident response plan: detection, containment, eradication, and recovery procedures.
- Digital forensics basics: preserving evidence and conducting investigations after a cyberattack.
- Importance of reporting cyberattacks to appropriate authorities.
Module 10: Cloud Security
- Security considerations for cloud computing platforms (AWS, Azure, GCP).
- Cloud security models: shared responsibility model, and securing cloud resources.
- Cloud security best practices: data encryption, access control, and incident response in the cloud.
Module 11: Web Application Security
- Common web application vulnerabilities (OWASP Top 10).
- Web application security testing (WAST) tools and methodologies.
- Secure coding practices for web developers.
Module 12: Security Operations Center (SOC)
- Understanding the role of SOC in cybersecurity operations.
- Security information and event management (SIEM) systems.
- Incident response procedures and threat hunting techniques
Module 13: Cryptography and Data Security
- Advanced encryption algorithms (AES, RSA) and key management techniques.
- Data security best practices: data encryption at rest and in transit.
- Understanding