IT Training
Cyber Security
Cybersecurity is essential for safeguarding digital assets and ensuring resilience against evolving threats. At Sazan Consulting, we specialize in delivering robust solutions to protect organizations from cyber risks. Our services cover threat assessment, risk mitigation, and advanced defense strategies, empowering businesses to operate securely in today’s digital landscape.
- Duration: 6-7 weeks
- Classes only on Weekends
Program Outline
Pre-requisite for Program: Basic understanding of Operating Systems, good understanding of Networking concepts
Job roles: Security Engineer, Cyber Security Specialist, Cyber Security Analyst, Ethical Hacker
Introduction to Cybersecurity
The Role of a Security Analyst: A Day in the Life
Fundamentals of Security Operations Centres (SOC)
Networking and Web Fundamentals
- Basics of Network Architecture
- Refresher on Networking Concepts
- Comparing OSI and TCP/IP Models
- The Mechanics of the Web
- Exploring DNS in Depth
- Understanding HTTP
- The Functioning of Websites
- Integrating Web Technologies
Basics of Operating Systems
- Getting Started with Linux
- Getting Started with Windows
Key Cyber Security Concepts
- Exploring the Cyber Kill Chain
- Overview of the MITRE ATT&CK Framework
Introduction to Cyber Security Tools
- A Guide to Using CyberChef
- Introduction to Wireshark
- Getting to Know Network Miner
- An Overview of SquareX
- Learning about Phishme Tool
Open-Source Intelligence (OSINT) Tools
- Utilizing Virus Total
- Exploring Hybrid Analysis
- Insights into URLscan.io
- Introduction to any.run
- Features of Domain Tools
- Discovering DNSview.io
- Additional OSINT Resources
Ethical Hacking and Penetration Testing
- Preparing Your Lab
- The Ethical Hacker’s Approach
- The Art of Reconnaissance
- Techniques for Scanning and Enumeration
- Basics of Exploitation
- Getting Started with Nessus
Malware Analysis and Response to Incidents
- Conducting Malware Analysis
- Setting Up a Malware Analysis Lab
- Performing Basic Static Analysis
- Conducting Basic Dynamic Analysis
- Essentials of Digital Forensics
- Understanding Memory Concepts
- Tools for Data Acquisition
- Analysing Windows Memory
- Analysing Linux Memory
- Real-Time Incident Response Scenarios
Cloud Security and Introduction to AWS
- Core Principles of Cloud and Docker
- Basics of AWS Services
- Getting to Know Amazon EC2
- Exploring Amazon S3
- Understanding Amazon VPC
- Introduction to AWS IAM
- Launching an EC2 Instance
- How to Launch an EC2 Instance
- Configuring Security Groups
- Installing Elastic Search Using Docker
- Docker Installation on EC2
- Deploying Elastic Docker Images
- Endpoint Log Management
- Managing AWS Incident Responses
- Analysis of Incidents
- Containment and Mitigation Strategies
- Reporting After an Incident
Security Information and Event Management (SIEM)
- Introduction to Qradar SIEM
- Lab Setup Instructions
- Discussing Qradar Architecture
- Developing Detection Strategies
- Administration and Management of Qradar
- Deploying Qradar on AWS
- Sample Use Cases for Qradar
Advanced Cybersecurity Topics
- In-depth Email Analysis
- Collaborative Security: Purple Team Dynamics
- Fundamentals of Governance, Risk, and Compliance (GRC) + Threat Hunting
- Getting Acquainted with Open-Source Tools
- How to Select the Right Tools for SecOps
Cyber Security Training
Novaratech training prepares individuals for roles such as Security Engineer, Cyber Security Specialist, Cyber Security Analyst, and Ethical Hacker.