Cybersecurity Traineeship Curriculum
CCI NoVa Node Cybersecurity Traineeship: Curriculum
Cybersecurity is constantly evolving field. A career in cyber requires a commitment to continual professional development and learning to keep up with these changes. Additionally, cybersecurity is a broad discipline with many different approaches, especially in industry.
The curriculum for NoVa Node's Cybersecurity Traineeship is designed to provide a broad set of entry-level technical skills, while cultivating the soft skills required of foundational cyber skills. The curriculum is by no means exhaustive, but it should provide a base upon which a career in cybersecurity can be build.
Data Analytics, Database Design, and SQL
Week 1
- Introduction to Data
- Introduction to Data Analytics (Descriptive Analytics, Diagnostic Analytics, Predictive Analytics, Prescriptive Analytics)
- The importance of Exploratory Data Analytics and Storytelling
- Data Analytics components
- Introduction to Database, Database Design
- MySQL Workbench (Introduction and Installation)
- Create a connection (local and remote)
- Data Definition Language (Create, Insert, Alter & Truncate)
- Select Queries
- Sorting and Order by Wildcard characters
- Aggregate Functions
- Not NULL and NULL keyword and value
- Sub Query, Union and Distinct
- Introduction to PL/SQL
- Function
- Trigger
Week 2
- Database Design
- Case Study – Database
- Case Study – Database (Continued)
- Presentation of case study
- Python Fundamentals
- Python – Functions, loops, Recursions
- Lists, Dictionaries and Tuples
- Files, classes, functions and methods
- What Is Data Visualization?
- Trends in Data Visualization—Storytelling
- Trends in Data Visualization—Interactive Graphics
- Explore the data visually (Histogram, Boxplots, Scatterplot, Moving average, Clusters, etc.)
- Devise the Problem, Challenge and/or Questions
- Visualization using Python
Week 3
- The Regression Paradigm – Concepts
- Use Cases and implementation in Python
- Classification Paradigm – Concepts
- Use Cases and implementation in Python
- Optimization Paradigm – Concepts
- Use Cases and implementation in Python
- Recommendation Paradigm – Concepts
- Use Cases and implementation in Python
- Case Study – Data Analytics
Week 4
- Data Analytics of log files
- Introduction of Splunk and setting of labs
- Getting started with Splunk
- Basic searching
- Using fields in searches
- Search fundamentals
- Transforming commands
- Creating reports and dashboards
- Creating and using lookups
- Learn the various data onboarding techniques
- Learn Reporting & Transforming commands in
- Field Extraction
- Event types
- Transaction
- Workflow action
- Create Alerts triggered on certain conditions
- Different Splunk Visualizations
- Create Reports with search results
- Create Dashboards with different Charts and other visualizations
- Set permissions for Reports and Dashboard
- Create Reports and schedule them using cron schedule
- Splunk Case Study
Networking & Security
Week 5
- Basic OSI overview
- Wireshark introduction
- Wireshark Installation
- Wireshark Filters
- History of Malware
- How Malware Works
- Types of Malware
- Case Studies
- Intro to OSINT
- How to: Google Dorking
Week 6
- Reconnaissance
- Knowledge bases
- The Sites of OSINT
- Network Review
- Network Ports
- Protocol and Services
- Identifying Malware and Malware symptoms
- Malware Scanning Applications
- Intro to Vulnerability Scanning
- Intro to PenTesting
- Tools for Ethnical Hacking
- Intro to Kali Linux
AWS Basics
Week 7
- AWS Cloud concepts
- Security and compliance within the AWS Cloud
- Deploying an operating in the AWS Cloud
- AWS global infrastructure
- Core AWS services
- Billing, account management, and pricing models