Laptop displaying a security lock icon on a table with a potted plant and clock.
IT Training

Cyber Security

Cybersecurity is essential for safeguarding digital assets and ensuring resilience against evolving threats. At Sazan Consulting, we specialize in delivering robust solutions to protect organizations from cyber risks. Our services cover threat assessment, risk mitigation, and advanced defense strategies, empowering businesses to operate securely in today’s digital landscape.

Program Outline

Pre-requisite for Program: Basic understanding of Operating Systems, good understanding of Networking concepts

Job roles: Security Engineer, Cyber Security Specialist, Cyber Security Analyst, Ethical Hacker

The Role of a Security Analyst: A Day in the Life
Fundamentals of Security Operations Centres (SOC)

  • Basics of Network Architecture
  • Refresher on Networking Concepts
  • Comparing OSI and TCP/IP Models
  • The Mechanics of the Web
  • Exploring DNS in Depth
  • Understanding HTTP
  • The Functioning of Websites
  • Integrating Web Technologies
  • Getting Started with Linux
  • Getting Started with Windows
  • Exploring the Cyber Kill Chain
  • Overview of the MITRE ATT&CK Framework
  • A Guide to Using CyberChef
  • Introduction to Wireshark
  • Getting to Know Network Miner
  • An Overview of SquareX
  • Learning about Phishme Tool
  • Utilizing Virus Total
  • Exploring Hybrid Analysis
  • Insights into URLscan.io
  • Introduction to any.run
  • Features of Domain Tools
  • Discovering DNSview.io
  • Additional OSINT Resources
  • Preparing Your Lab
  • The Ethical Hacker’s Approach
  • The Art of Reconnaissance
  • Techniques for Scanning and Enumeration
  • Basics of Exploitation
  • Getting Started with Nessus
  • Conducting Malware Analysis
  • Setting Up a Malware Analysis Lab
  • Performing Basic Static Analysis
  • Conducting Basic Dynamic Analysis
  • Essentials of Digital Forensics
  • Understanding Memory Concepts
  • Tools for Data Acquisition
  • Analysing Windows Memory
  • Analysing Linux Memory
  • Real-Time Incident Response Scenarios
  • Core Principles of Cloud and Docker
  • Basics of AWS Services
  • Getting to Know Amazon EC2
  • Exploring Amazon S3
  • Understanding Amazon VPC
  • Introduction to AWS IAM
  • Launching an EC2 Instance
  • How to Launch an EC2 Instance
  • Configuring Security Groups
  • Installing Elastic Search Using Docker
  • Docker Installation on EC2
  • Deploying Elastic Docker Images
  • Endpoint Log Management
  • Managing AWS Incident Responses
  • Analysis of Incidents
  • Containment and Mitigation Strategies
  • Reporting After an Incident
  • Introduction to Qradar SIEM
  • Lab Setup Instructions
  • Discussing Qradar Architecture
  • Developing Detection Strategies
  • Administration and Management of Qradar
  • Deploying Qradar on AWS
  • Sample Use Cases for Qradar
  • In-depth Email Analysis
  • Collaborative Security: Purple Team Dynamics
  • Fundamentals of Governance, Risk, and Compliance (GRC) + Threat Hunting
  • Getting Acquainted with Open-Source Tools
  • How to Select the Right Tools for SecOps

Cyber Security Training

Novaratech training prepares individuals for roles such as Security Engineer, Cyber Security Specialist, Cyber Security Analyst, and Ethical Hacker.