|Subject Name||Subject Description|
|Blue Team Fundamentals||In this course, participants learn in-depth cybersecurity concepts and techniques. Learners should have knowledge of the basics of cyber technology, such as the most common operating systems (OS) in use throughout the world, computer network communication, the cloud environment, and virtualization. The fundamentals are taught with security in mind, and security perspectives are consistently explained in the course.|
|Microsoft Security||This course teaches learners how to manage and operate a Microsoft domain environment that includes Windows Server 2012 operating systems, which is the most common data center system in use today. Participants learn the differences between newer OS versions such as Windows Server 2016 and 2019. The course also covers the security aspects and hardening of those environments and systems.|
|Computer Networking||Cybersecurity professionals need to have an in-depth understanding of networking. Participants learn all the necessary networking concepts, including protocols, topologies, and network devices. This course prepares learners with the knowledge they need to take the CompTIA Network+ exam.*|
|Cloud Security||In this course, the focus is on the growing use of cloud platforms and how environments are managed and secured in the cloud. Learners obtain knowledge that will be useful for practice and labs in the advanced courses that follow. This course teaches the objectives of the AWS Certified Cloud Practitioner certification.*|
|Linux Security||This course teaches how to manage and operate a Linux environment, with specific emphasis on the cybersecurity distribution known as Kali Linux. Participants learn the security and hardening aspects of Linux environments in preparation for the LPI Linux Essentials certification exam.*|
|Network Security||The purpose of this course is to build the skill set needed to secure, manage, and operate network communication equipment and systems, and to teach learners how to implement network security tools and technologies to protect a variety of organizational types. During this course, learners will prepare for the Cisco Certified CyberOps Associate exam.*|
|Cyber Infrastructure & Technology||While the previous course covers network security measures, this course provides the knowledge and practical training needed to design and maintain secure infrastructures and technologies. Participants learn how to implement various security countermeasures, through tools like SIEM, SOAR, IoT, endpoint security, and other cyber technologies, to protect organizations. The course begins to cover the CompTIA Security+ and CySA+ certificate objectives.|
|Introduction to Python for Security||This course is an introduction to the world's most advanced programming language, Python. During this course, participants learn the fundamentals of object-oriented programming. Hundreds of thousands of cybersecurity professionals use Python every day to write code for scripting and the automation of security-related tools.|
|Offensive Security: Ethical Hacking||
In this course, participants learn how to execute a variety of cyber-attacks and defend against them. They also gain the knowledge and tools they need to discover and exploit system vulnerabilities, penetrate organizational infrastructures, and hack into web interfaces.
The purpose of the course is not to achieve penetration tester status, but to provide a hacker's perspective so the learner will be a better defender. The course provides learners with the skill set required for a future career in ethical hacking and penetration testing.
|DFIR & Threat Hunting||This course introduces learners to Digital Forensics and Incident Response. Course participants will learn how to handle cyber attacks as they occur, and the dynamics of working in a Security Operations Center (SOC) team. The curriculum will help learners complete the CompTIA Security+, CompTIA CySA+, and (ISC)2 SSCP certification exam* objectives|
|Game Theory Strategy in Cybersecurity||Course participants learn how to reach inside the mind of a hacker and implement the fundamentals of Game Theory as they apply to cybersecurity defense and solutions. Learners completing this course finish with an out-of-the-box mindset and achieve the main objectives of the program: to build the skillset and the ability to find solutions on their own and become creative problem solvers.|
|Industry Project||This programme involves project-based learning, where you are required to work on projects, related to your course of study. You are expected to undertake various activities discussed with and assigned by the supervisors. The programme enables you to apply knowledge and skills acquired in the course of your study to address practical problems in the real workplace.|
* Certification exams are not conducted as part of the Up-Skill in Cybersecurity program and require additional costs not included in tuition. While the curriculum provides the knowledge needed to perform well on industry exams, the Up-Skill in Cybersecurity is not a test-preparation program, where the primary focus is the learner’s performance on the exam. The Up-Skill in Cybersecurity program is designed to teach in-demand knowledge for today's workforce.