Week 1 | Advanced Cryptography • Advanced Cryptographic Protocols: TLS, SSH • Cryptographic Attacks and Countermeasures • Implementing Cryptographic Solutions • Hands-On: Configuring and Testing Cryptographic Protocols |
Week 2 | Security for IoT Devices • IoT Security Challenges and Threats • Securing IoT Devices and Networks • IoT Security Frameworks and Standards • Hands-On: Implementing IoT Security Measures |
Week 3 | Mobile Security • Mobile Operating Systems Security (iOS, Android) • Common Mobile Threats and Vulnerabilities • Mobile Security Best Practices • Hands-On: Securing Mobile Applications |
Week 4 | Advanced Penetration Testing • Exploiting Advanced Vulnerabilities • Post-Exploitation Techniques • Reporting and Remediation of Findings • Hands-On: Conducting Advanced Penetration Testing |
QUIZ 1 |
|
Week 5 | Threat Hunting and Intelligence • Introduction to Threat Hunting • Threat Intelligence Sources and Feeds • Building and Using Threat Models • Hands-On: Performing Threat Hunting Activities |
Week 6 | Security Auditing and Compliance • Conducting Security Audits • Compliance Standards and Frameworks (NIST, ISO 27001) • Auditing Tools and Techniques • Hands-On: Performing a Security Audit |
Week 7 | Cybersecurity Risk Management • Risk Assessment and Management Frameworks • Risk Mitigation Strategies • Business Continuity and Disaster Recovery Planning • Hands-On: Developing a Risk Management Plan |
Week 8 | Secure Software Development Lifecycle (SDLC) • Integrating Security into SDLC • Threat Modeling and Secure Coding Practices • Tools for Secure Development: SAST, DAST • Hands-On: Implementing Security in SDLC |
QUIZ 2 |
|
Week 9 | Forensics and Incident Analysis • Digital Forensics Fundamentals • Forensic Analysis Tools and Techniques • Chain of Custody and Evidence Preservation • Hands-On: Conducting a Digital Forensic Investigation |
Week 10 | Security Governance and Policy • Developing and Implementing Security Policies • Governance, Risk, and Compliance (GRC) • Policy Frameworks and Best Practices • Hands-On: Creating and Enforcing Security Policies |
Week 11 | - |
Week 12 | - |
PROJECT REPORT |