Weekend 1
- Introduction to Cybersecurity
- What is cybersecurity?
- The history of cybersecurity
- The different types of cyberattacks
- The importance of cybersecurity
- Risk Management
- What is risk management?
- The different types of risks
- How to identify and assess risks
- How to mitigate risks
- Threat Intelligence
- What is threat intelligence?
- How to gather threat intelligence
- How to use threat intelligence to protect your organization
- Vulnerability Management
- What is vulnerability management?
- How to identify vulnerabilities
- How to prioritize vulnerabilities
- How to remediate vulnerabilities
Weekend 2
- Penetration Testing
- What is penetration testing?
- The different types of penetration tests
- How to plan and execute a penetration test
- How to report the results of a penetration test
- Incident Response
- What is incident response?
- The different phases of incident response
- How to plan and execute an incident response plan
- How to communicate during an incident
- Forensics
- What is forensics?
- The different types of forensics
- How to collect evidence
- How to analyze evidence
- How to present evidence in court
- Disaster Recovery
- What is disaster recovery?
- The different types of disasters
- How to plan and execute a disaster recovery plan
- How to test and maintain a disaster recovery plan
Weekend 3
- Malware Analysis
- What is malware?
- The different types of malware
- How to identify malware
- How to remove malware
- Cyberwarfare
- What is cyberwarfare?
- The different types of cyberwarfare
- How to protect your organization from cyberwarfare
- Cyber Law
- What is cyber law?
- The different types of cyber laws
- How to comply with cyber laws
- Ethics
- What is ethics?
- The ethical considerations of cybersecurity
- How to make ethical decisions in cybersecurity
Weekend 4
- Cloud Security
- What is cloud security?
- The different types of cloud security risks
- How to protect your organization in the cloud
- IoT Security
- What is IoT security?
- The different types of IoT security risks
- How to protect your organization's IoT devices
- Artificial Intelligence (AI) Security
- What is AI security?
- The different types of AI security risks
- How to protect your organization from AI-powered cyberattacks
- Cybersecurity Operations
- What is cybersecurity operations?
- The different tasks involved in cybersecurity operations
- How to manage a cybersecurity operations team
Weekend 5
- Security Architecture
- What is security architecture?
- The different types of security architectures
- How to design a security architecture for your organization
- Security Engineering
- What is security engineering?
- The different types of security engineering tasks
- How to implement security controls in your organization
- Security Governance
- What is security governance?
- The different types of security governance frameworks
- How to implement a security governance framework in your organization
- Security Culture
- What is security culture?
- How to create a security-conscious culture in your organization
Weekend 6
- Security Leadership
- What is security leadership?
- The different roles and responsibilities of security leaders
- How to be an effective security leader
- Security Careers
- The different types of security careers
- How to get a job in cybersecurity
- Security Research
- What is security research?
- The different types of security research
- How to conduct security research
- Security Trends
- The latest trends in cybersecurity
- How to stay ahead of the curve in cybersecurity
Weekend 7
Cyber Range Exercise 1
Weekend 8
Cyber Range Exercise 2
Weekend 9
Cyber Range Exercise 3
Weekend 10
- Red Team Blue Team Exercise
Comments