Overview
(Includes Cybersecurity Fundamentals)
This cybersecurity course is designed by veteran industry experts, including PhD holders, who have worked in critical sectors of national importance such as space, defense, and more. It is taught by professionals with extensive hands-on experience in implementing projects at key locations.
The Cybersecurity Associate - SOC Analyst course is designed to provide a comprehensive understanding of the fundamental concepts and practical skills required to start a career in Cybersecurity. This program is ideal for individuals aspiring to become SOC Analyst , equipping them with the knowledge and hands-on experience required to monitor a network in the Security Operations Center and to further pursue Cybersecurity Professional course.
Curriculum
- What is Cybersecurity
- Understanding Cybersecurity Terminology
- Components of Cybersecurity: Networking, Server Administration, Security Operations Center
- Introduction to Networking
- Types of Networks: LAN, MAN, WAN, Internet
- Network Topologies: Bus, Ring, Star, Mesh
- Essential Network Components: NIC Cards, MAC Addresses, Hubs, Switches, Routers, Firewalls
- OSI Reference Model and TCP/IP Model
- Introduction to Operating Systems
- Overview of Windows, Linux, and Mac OS
- Installation Processes: Windows Server 2022, Windows 11, Ubuntu Server, Ubuntu Client
- Understanding LAN Networks
- Setting up a LAN: Components and Functions
- Working with Hubs and Switches: Broadcast Traffic, MAC Tables, Unicast
- Understanding IP Addresses
- Types of IP Addressing: IPv4 and IPv6
- Subnetting Techniques
- Active Directory Setup and Management
- Domain and Workgroup Models
- File and Printer Sharing
- DHCP and DNS Services
- Internet Information System (IIS)
- Linux Operating System Basics
- Linux Filesystem and User Accounts
- File Permissions and Package Management
- Setting up Web and FTP Servers
- Introduction to Routers and Their Functions
- Configuring Cisco Routers
- WAN Connectivity and Routing Principles
- Types of Routing: Static, Dynamic, Default
- Network Address Translation (NAT) and Port Address Translation (PAT)
- Static NAT
- Configuring Organization Routers
- Configuring Home WiFi Routers
- WiFi Security for Home Users
- Troubleshooting System, LAN, and WAN Connectivity Issues
- Understanding Cloud Computing
- Types of Cloud Technologies: SAAS, PAAS, IAAS
- Overview of Cloud Service Providers: AWS, Azure, GCP
- Creating Cloud Machines on AWS, Azure, and GCP
- ARP Protocol
- DHCP Protocol
- DNS Protocol
- HTTP Protocol
- FTP Protocol
- SMTP Protocol
- SSH Protocol
- Telnet Protocol
- Common Cyber Threats
- Host Discovery
- Service Enumeration
- Vulnerability Scanning
- Web Application Attacks
- Directory Traversal
- Cross-Site Scripting
- SQL Injection
- Password Cracking
- Brute Force Attack
- Dictionary Attack
- Phishing Attack
- Man-in-the-Middle Attack
- Denial of Service (DoS)
- Distributed Denial of Service (DDoS)
- Malware Types
- Virus
- Worms
- Trojans
- Ransomware
- Incident Response
- What is SOC
- Roles and Responsibilities of SOC
- Tools & Technologies in SOC
- Firewall
- IDS
- IPS
- Next-Gen Firewall
- UTM
- SIEM
- Endpoint Detection and Response (EDR)
- Security Information and Event Management (SIEM)
- What is SIEM
- Functions of SIEM
- SIEM Dashboard and Alerts
Course Schedule
Course Schedule
8:00 AM
(IST - GMT +5.30)
1 Month
2 Hrs/Day
Sunday Off
7:00 PM
(IST - GMT +5.30)
1 Month
2 Hrs/Day
Sunday Off
8:00 PM
(IST - GMT +5.30)
1 Month
2 Hrs/Day
Sunday Off
8:00 AM
(IST - GMT +5.30)
1 Month
2 Hrs/Day
Sunday Off
For Online Training Students
- Instructions will be Provided to do Lab Practicals with your PC at Home
- You will receive a link to your email in an hour after the class from Webex to Download the Recorded Videos..
- All our study materials are available for free access on our online portal for registered students
Imp. Note
- Fees once paid will not be refunded or adjusted against other courses / batches / students under any circumstances whatsoever.
- Organization reserves the right to expel any student during the training period.
- In case, a student fails to attend the given batch the amount given will be forfeited against his / her name.
FAQ'S
US-Council Certification is a set of comprehensive programs aiming to create cybersecurity experts capable of defending against cyber threats. Unlike other cybersecurity certification, which focuses on ethical hacking, US-Council provides a broader approach towards cybersecurity education and awareness, including proactive defense strategies and security testing services.
Choosing US-Council for your cybersecurity certification ensures that you receive thorough education and awareness about the latest security measures and cyber threats. With certifications from US-Council, you gain access to free white papers, the opportunity to become an authorized partner, and insights from informative live webinars, all tailored to help you secure or perish in the face of cybercrime.