Overview

us-council Certified Cybersecurity Professional

(Pre-Requisite Knowledge of Cybersecurity Associate (SOC Analyst))

FREE US-Council Certification Exam Voucher

This cybersecurity course is designed by veteran industry experts, including PhD holders, who have worked in critical sectors of national importance such as space, defense, and more. It is taught by professionals with extensive hands-on experience in implementing projects at key locations.

Cybersecurity Professional course is designed to give you a comprehensive understanding of cybersecurity concepts and practices, equipping you with the skills and knowledge necessary to defend against cyber attacks. Whether you are a network administrator or security professional or simply interested in learning about cybersecurity, this course will provide you with the skills you need to help keep your systems and data secure.

Curriculum

Cybersecurity Professional

1 Month

Module 1: Security Risk Assessment (Ethical Hacking)

  • Introduction to Ethical Hacking 
    • What is Hacking 
    • Skills of a hacker 
    • Types of Hackers 
    • Network Security Challenges 
    • What is Ethical Hacking 
  • Information Security 
  • Information Assurance 
  • Elements of Information Assurance 
  • Stages of Hacking 
  • Vulnerability Based Hacking  

            - Footprinting 

                       What is Footprinting 

                       Footprinting Techniques  

             - Scanning  

                       What is Scanning  

                       What is Enumeration   

                       Scanning methodology  

                       Continuous Automated Red Teaming (CART)  

                       AI Fuzzing  

                       Vulnerability Assessment   

                       Penetration Testing  

  •  Hacking Web Applications 

             - What is a Web Application  

             - Web Application Attacks              

                       Code Injection   

                       Web site defacement    

                       SQL Injetion   

                       XSS 

  •  Cryptography  

             - What is Cryptography   

             - Types of Cryptography   

             - Cryptographic Hash          

  •  Password Hacking Attacks   

             - Password guessing    

             - Shoulder Surfing    

             - Social Engineering 

             - System hacking    

             - Bruteforce attack    

             - Dictionary attack 

             - Rainbow tables  

  •  Sniffers   

             - What is a sniffer    

             - How does a sniffer function    

             - Sniffing techniques 

  •  Phishing    

             - What is Phishing     

             - Phishing techniques     

             - Spear Phishing  

             - Whaling      

             - Pharming      

             - Vishing   

  •  Wireless Hacking    

             - What is a Wireless Network     

             - Types of Wireless Networks     

             - Different WiFi standards  

             - WiFi attacks   

  •  Malware     

             - What is Malware      

             - Types of Malware      

             - Privilege Escalation   

             - Unauthorized Application Execution   

  •  IoT Attacks     

             - What is IoT      

             - IoT communication methods      

             - IoT communication protocols   

             - IoT Operating Systems       

             - Security Challenges in IoT       

             - IoT Attacks

  •  Cloud Computing      

             - What is Cloud Computing       

             - Types of Cloud Computing       

             - Cloud Computing Services    

             - Cloud Computing Attacks  

  •  Blockchain Attacks       

             - What is Blockchain        

             - Blockchain Attacks  

  •  Denial of Service (DoS)       

             - What is DoS        

             - What is DDoS        

             - Botnets     

             - DoS/ DDoS attack techniques 

  •  Anonymizers        

             - What is an anonymizer        

             - Why are anonymizers used         

             - Types of anonymizers      

                       Proxy    

                       VPN Proxy     

                       TOR Browser    

  •  DarkWeb         

             - What is DarkWeb         

             - Different DarkWeb technologies  

                       Freenet     

                       I2P      

                       TOR    

  •  Covering Tracks         

             - How hackers cover their tracks   

  •  Cyber Kill Chain 
  •  Securing the Network   

             - Hardware encryption         

             - Software encryption          

             - PKI    

  •  Introduction to MITRE ATT&CK Framework   
  •  Introduction to Security Compliance Standards 
  •  Cyber Resilience  
  •  Cyber Fusion Center  

Module 2: Proactive Defense and Countermeasures

  •  Network Security    

             - Introduction to Security     

             - Network Security Challenges     

             - Elements of Information Security  

             - Network Security Devices     

             - The Castle Moat approach    

             - Zero Trust approach  

             - Secure Access Service Edge (SASE)   

  •  Firewalls    

             - What is a Firewall     

             - Different Firewall technologies 

                     Packet Filtering Firewall 

                     Application Gateway 

                     Stateful Firewall 

             - Designing Security with Firewall      

             - NAT 

             - Security Policy     

             - Content Management      

             - User Identity Management  

             - Logging      

             - Reporting    

  •  Intrusion Prevention System (IPS)  

             - What is Intrusion Prevention System      

             - Difference between Intrusion Prevention System & Intrusion Detection System 

             - Configuring Intrusion Prevention System  

  •  Virtual Private Network (VPN)     

             - What is a VPN      

             - Types of VPNs  

                      GRE  

                      IPSec  

                      SSL  

  •  High Availability   
  •  Cloud Firewalls 

Module 3: SIEM & Incident Response

  •  SIEM 

            - What is SIEM 

  •  Incident Response 

            - What is Incident Response 

Course Schedule

Course Schedule

Cybersecurity Professional

16 Mar 2026

02:00 PM to 04:00 PM

(IST - GMT +05:30)

1 Month

2 Hrs/Day

Sunday off

Classroom

16 Mar 2026

08:00 PM to 10:00 PM

(IST - GMT +05:30)

1 Month

2 Hrs/Day

Sunday off

Online

30 Mar 2026

04:00 PM to 06:00 PM

(IST - GMT +05:30)

1 Month

2 Hrs/Day

Sunday off

Online

15 Apr 2026

08:00 AM to 10:00 AM

(IST - GMT +05:30)

1 Month

2 Hrs/Day

Sunday off

Online

30 Apr 2026

11:00 AM to 01:00 PM

(IST - GMT +05:30)

1 Month

2 Hrs/Day

Sunday off

Online

15 May 2026

08:00 PM to 10:00 PM

(IST - GMT +05:30)

1 Month

2 Hrs/Day

Sunday off

Online

For Online Training Students

  • Instructions will be Provided to do Lab Practicals with your PC at Home
  • You will receive a link to your email in an hour after the class from Webex to Download the Recorded Videos..
  • All our study materials are available for free access on our online portal for registered students


Sample Certificate

sample certificate for us-council cybersecurity professional

Study Material

FAQ'S

What is US-Council Certification and how does it differ from other cybersecurity certification?

US-Council Certification is a set of comprehensive programs aiming to create cybersecurity experts capable of defending against cyber threats. Unlike other cybersecurity certification, which focuses on ethical hacking, US-Council provides a broader approach towards cybersecurity education and awareness, including proactive defense strategies and security testing services.

Why should I choose US-Council for my cybersecurity certifications?

Choosing US-Council for your cybersecurity certification ensures that you receive thorough education and awareness about the latest security measures and cyber threats. With certifications from US-Council, you gain access to free white papers, the opportunity to become an authorized partner, and insights from informative live webinars, all tailored to help you secure or perish in the face of cybercrime.
Cybersecurity Professional Course slider image. Preview this course
Duration : 1 Month
Mode Of Training : Online
Placement Assistance : Yes
Certificate : Yes
Price: 25,000

All prices are subject to an 18% Goods and Service Tax (GST) Charge. Rate quoted in U.S. dollars subject to change according to Foreign Exchange rates.

Once you make the payment, kindly contact our course counsellor at priya@zoomgroup.com to schedule the course as per your convenience from the available slots.