Skip to main content

#Cyber Security

Cyber Security focuses on protecting systems, networks, and data from cyber threats using offensive and defensive security techniques. It equips you with skills in ethical hacking, SOC operations, SIEM, threat detection, incident response, cloud security, and compliance, preparing you for roles like Cyber Security Analyst, SOC Analyst, Ethical Hacker, SIEM Engineer, and Information Security Specialist.

  • ✅Ethical Hacking & Offensive Security
  • ✅Advanced Ethical Hacking Tools
  • ✅ Networking for Cyber Security
  • ✅Cryptography & Data Protection
  • ✅Web Application & Vulnerability Attacks
  • ✅Cloud Security (AWS, Azure, GCP)
  • ✅SOC Operations & Blue Team Skills
  • ✅SIEM, EDR & Threat Hunting
  • ✅Malware Analysis & Email Security
  • ✅GRC, Risk, Compliance & Audits

Module 1: Cyber Security – Ethical Hacking

Ch 1: Introduction to Cybersecurity

  • The evolution of Cybersecurity
  • What is Information Security & Cybersecurity
  • Cybersecurity objectives
  • Cybersecurity Roles
  • Domain of cyber security
  • Cybersecurity objectives
  • The Cybersecurity skills gap
  • Cybersecurity & situational awareness

Ch 2: Operating Systems in Cyber Security

  • Intro to operating systems
  • Different types of Operating Systems
  • What is Virtual Machine
  • What is Virtualization
  • Intro to Kali Linux

Ch 3: Ethical Hacking in Cyber Security

  • Introduction to Ethical hacking
  • What is hacking
  • Types of Hackers
  • World Top 10 hackers and their HATs
  • 5 Phases of Hacking
  • FootPrint/Information Gathering

Ch 4: Ethical Hacking Tools

  • Tools: Maltego, Recon-ng, whois, Shodan, Google
  • Scanning
  • Tools: Nmap, Angry IP Scanner, Nessus

Ch 5: Ethical Hacking Access

  • Gaining Access
  • Maintaining Access
  • Clearing Tracks
  • Types of Attacks – Active / Passive Attacks
  • Penetration Testing
  • Offensive and defensive security
  • Teams in cyber security – Red/Blue/Purple

Ch 6: Networking Essentials in Cyber Security – 1

  • Infrastructure Terminology
  • Designing with Security in Mind
  • Network Diagrams
  • Network Topology
  • OSI Layers & TCP/IP Model
  • IPv4 & Ipv6
  • Ports & protocols
  • Port numbers

Ch 7: Networking Essentials in Cyber Security – 2

  • Wireless Attacks
  • Firewalls
  • IDS/IPS
  • Honeypots
  • Cloud Computing
  • VPNs and VPN Concentrators

Ch 8: Networking Essentials in Cyber Security – 3

  • Intrusion Detection Systems
  • Router
  • Switch
  • Proxy
  • Network Access Control (NAC)
  • Different Types of networks

Ch 9: Cryptography & Data Protection – 1

  • Introduction to Cryptography
  • Purpose and role in cybersecurity
  • Key terminology (plaintext, ciphertext, key, algorithm)
  • Types of Cryptography
  • Symmetric Encryption (AES, DES, 3DES, Blowfish)
  • Asymmetric Encryption (RSA, ECC)
  • Hybrid encryption models

Ch 10: Cryptography & Data Protection – 2

  • Hashing & Integrity
  • Hash functions (MD5, SHA-1, SHA-256, SHA-3)
  • Digital fingerprints and integrity verification
  • Common hashing use cases (password storage, file verification)
  • Digital Signatures & Certificates
  • Signing process and verification
  • Role of PKI (Public Key Infrastructure)
  • 509 certificates
  • Key Management
  • Key generation, distribution, storage, and rotation
  • Hardware Security Modules (HSMs)
  • Key escrow and recovery procedures

Ch 11: Data Protection & Encryption – 1

  • Cryptographic Protocols
  • SSL/TLS basics
  • IPsec and VPN encryption
  • Secure Email protocols (S/MIME, PGP)
  • Common Cryptographic Attacks
  • Brute force & dictionary attacks
  • Hash collision attacks
  • Data Encryption at Rest & In Transit
  • Disk encryption (BitLocker, VeraCrypt)
  • Database encryption methods

Ch 12: Data Protection & Encryption – 2

  • Network encryption (HTTPS, SSH, VPN)
  • Compliance & Best Practices
  • Cryptography in ISO 27001, PCI DSS, HIPAA
  • Strong encryption standards & key length recommendations
  • Avoiding deprecated algorithms
  • Tools for Cryptography
    1. OpenSSL
    2. hashcat

Ch 13: Advanced Pentesting in Cyber Security

  • Introduction to Bug Bounty
  • Basic Terminology on Bug Bounty
  • Bug Bounty Platforms
  • Lab setup for Pentesting
  • Installation of Burp Suite Tool
  • Bug Bounty Platforms
  • Reporting of the bugs
  • Vulnerability Scanner Tools
  • Web Application Vulnerabilities
  • Cross Site Scripting
  • Host Header Injection
  • URL Redirection Attack
  • Parameter Tampering
  • SQL Injection
  • Bypass Authentication
  • Sensitive Information

Ch 14: Vulnerability Attacks in Cyber Security

  • File Upload Vulnerability
  • Disclosure Vulnerability
  • CSRF Attack Vulnerability
  • information disclosure
  • XML Vulnerability
  • Missing SPF Records vulnerability
  • OTP Bypass Technique Vulnerability
  • IDOR Vulnerability
  • No rate Limit Vulnerability
  • Session Hijacking Vulnerability
  • Long Password Attack Vulnerability

Ch 15: Cloud Security – 1

  • Cloud Security Fundamentals
  • Shared Responsibility Model
  • Cloud Infrastructure Threats
  • AWS Cloud Security fundamentals
  • AWS Cloud Security Tools and usages
  • Azure Cloud Security fundamentals
  • Azure Cloud Security Tools and usages
  • GCP Cloud Security fundamentals

Ch 16: Cloud Security – 2

  • Cloud Resource Exploitation
  • Unmonitored API Calls and Access Keys
  • Credential Theft from Repositories
  • Cloud Identity Attacks
  • Lateral Movement in Cloud Environments
  • Lack of Visibility and Logging

Module 2: Defensive Security (Blue Team) @ SOC / SIEM / EDR

Ch 17: SOC Fundamentals

  • SOC Overview
  • SOC Team Structure
  • Tier 1 Responsibilities
  • Tier 2 Responsibilities
  • Tier 3 Responsibilities
  • SOC Workflow and Escalation Path

Ch 18: Alert System

  • Alert Lifecycle Stages
  • Incident Response Phases
  • Types of Alerts Handled in SOC
  • Daily SOC Monitoring Activities
  • KPIs and Metrics for SOC
  • Incident Response Phases
  • Types of Alerts Handled in SOC
  • Daily SOC Monitoring Activities
  • KPIs and Metrics for SOC

Ch 19: Log Mechanism & Audits

  • Log Collection Strategy
  • Log Parsing and Normalization
  • Key SOC Log Sources
  • Firewall Logs
  • IDS/IPS Logs
  • DNS Logs
  • Endpoint Logs (Sysmon/EDR)
  • Active Directory Logs
  • Cloud Logs (CloudTrail, Azure Activity)

Ch 20: Cyber Security : SIEM (Splunk)

  • Introduction to SIEM
  • Use Case Design in SIEM
  • Overview of Splunk Architecture

Ch 21: Splunk Operations

  • Splunk Ingestion and Indexing
  • Writing SPL Queries
  • Splunk Dashboards and Alerts
  • QRadar Architecture and Flow Collection
  • QRadar Rule Creation using CRE
  • Rule Writing – SPL (Splunk), AQL (Qradar)

Ch 22: Threat Hunting & Splunk

  • Threat Hunting Basics
  • Alert Enrichment Techniques
  • Alert Suppression & False Positive Handling
  • Ticketing Systems (ServiceNow, JIRA) Integration
  • Shift Handover Protocols

Ch 23: QRadar

  • AQL Querying in Qradar
  • Introduction to EDR
  • SentinelOne Architecture
  • SentinelOne Agent Capabilities
  • Remote Response Actions
  • (Kill, Quarantine, Rollback)

Ch 24: Mobile Security

  • Introduction to Mobile Security
  • Threats via Malicious Applications
  • App Cloning and Impersonation
  • Jailbreaking and Rooting Risks
  • Insecure App Communication
  • Phishing via SMS or Messaging Apps
  • Wi-Fi-based Attacks (MITM)
  • Mobile Email Account Compromise
  • Keylogging via Spyware Apps
  • Mobile Device as
  • Entry Point into Corporate Networks

Ch 25: Malware Analysis

    • Introduction to Malware Analysis
    • Malware Categories
    1. Virus
    2. Worm
    3. Trojan
    4. Ransomware
    5. Spyware
    6. Rootkit
    7. Fileless Malware
      • Malware Behavior and Infection Chain
      • Static Analysis Fundamentals

Ch 26: Metadata Security

  • File Header and Metadata Check
  • String Extraction (strings, FLOSS)
  • PE Header Inspection
  • Hashing (MD5, SHA256) and Use Cases
  • Dynamic Analysis Overview
  • Sandbox Analysis (Any.run, Cuckoo)
  • Tools for Monitoring Behavior
  • ProcMon
  • RegShot
  • Wireshark
  • TCPView

Ch 27: IOC & Cyber Security

  • Reverse Engineering Introduction
  • Disassemblers (Ghidra, IDA Free)
  • Debuggers (x64dbg, OllyDbg)
  • Packers and Obfuscation
  • IOC Extraction Process
  • Types of IOCs
  • File Hashes
  • Registry Keys
  • IPs and Domains
  • Filenames

Ch 28: Cyber Security – Emails

  • Overview of Email-Based Threats
  • Anatomy of a Phishing Email
  • Spear Phishing vs Generic Phishing
    • Business Email Compromise (BEC)
    • Malware Delivery via Email
    • Email Header Components
    • SPF Record Validation
    • DKIM Signature Verification
    • DMARC Policy Enforcement
    • Email Flow and Received Headers
    • Tools for Email Security
    1. Microsoft Defender for O365
    2. Cisco ESA
    3. Proofpoint
    4. Mimecast
  • IOC Search in Mailboxes
  • Quarantining and Purging Emails

Ch 29: Data Security ( DLP)

  • Intro to Data Security
  • Intro to DLP
  • DLP for Emails
  • DLP for Files
  • Writing and applying rules in DLP
  • Proofpoint DLP
  • User Awareness and Reporting Channels

Ch 30: Threat Intelligence & Incident Response

    • Threat Intelligence Fundamentals
    • Intelligence Lifecycle Stages
    • Strategic vs Tactical vs
    • Operational vs Technical TI
    • IOC Formats (IP, Hash, URL, Domain)
    • TI Sources and Feeds
    1. VirusTotal
    2. AlienVault OTX
    3. Recorded Future
    4. Shodan
    5. io

    MITRE ATT&CK Overview

Ch 31: IOC & SIEM

  • IOC Enrichment in SIEM
  • Incident Response and Threat Factors
  • Types Incident need to reported
  • Management of incidents
  • Reporting and remediating Incidents
  • Learning from Past Incidents

Module 3: GRC

Ch 32: Governance & Information Security Frameworks

  • Overview of Governance in Cybersecurity
  • Role of governance in InfoSec
  • Key governance principles and policies
  • Information Security Management Systems (ISMS)
  • Purpose and structure of ISMS
  • PDCA (Plan–Do–Check–Act) cycle

Ch 33: Governance & CIS

  • ISO 27001/27002 Overview
  • NIST Cybersecurity Framework (CSF)
  • CIS Controls
  • COBIT for Information Security Governance
  • Security Policies & Standards
  • Policy hierarchy (Policies → Standards → Procedures → Guidelines)
  • Writing effective security policies
  • Roles & Responsibilities in GRC
  • Board, CISO, risk managers, compliance officers
  • RACI matrix in security governance

Ch 34: Risk Management & Assessment

  • Risk Management Fundamentals
  • Risk terms (Threat, Vulnerability, Impact, Likelihood)
  • Risk appetite & tolerance
  • Risk Assessment Methodologies
  • Qualitative vs Quantitative
  • Common methods: ISO 27005, NIST SP 800-30
  • Risk Identification

Ch 35: Risk Management & Assessment

  • Asset identification & classification
  • Threat and vulnerability mapping
  • Risk Analysis & Evaluation
  • Risk scoring & prioritization (Heatmaps, Risk Matrix)
  • Business Impact Analysis (BIA)
  • Risk Treatment Strategies
  • Accept, Avoid, Transfer, Mitigate
  • Residual risk management
  • Risk Register Management
  • Structure and maintenance of a risk register

Ch 36: Compliance & Audit Management

  • Compliance Fundamentals
  • Legal, regulatory, and contractual requirements
  • Sector-specific regulations (GDPR, HIPAA, PCI DSS, SOX, )
  • Security Control Mapping
  • Cross-mapping controls between frameworks (ISO, NIST, CIS)
  • Maintaining a controls library
  • Internal & External Audits
  • Audit lifecycle (Planning → Fieldwork → Reporting → Follow-up)
  • Evidence gathering and validation

Ch 37: Cyber Security Tools

  • Tools for compliance tracking (Archer, ServiceNow GRC, OneTrust)
  • Key compliance metrics & dashboards
  • Remediation & Gap Closure
  • Corrective Action Plans (CAPs)
  • Post-audit follow-up process

Ch 38: Security Awareness, Exception

  • Security Awareness Programs
  • Designing GRC-focused awareness campaigns
  • Measuring awareness effectiveness
  • Exception Management
  • Types of security exceptions
  • Approval workflow & documentation
  • Monitoring and tracking approved exceptions

Ch 39: Policy Management

  • Policy Lifecycle Management
  • Drafting, reviewing, approving, and publishing policies
  • Version control & review timelines
  • GRC Reporting & Metrics
  • Executive dashboards & board-level reporting
  • Key Risk Indicators (KRIs) & Key Performance Indicators (KPIs)
  • Integration with Incident Response
  • Using GRC data in IR investigations
  • Lessons learned & continuous improvement in governance

Module 4: Databricks Data Engineer Associate

Databricks Data Engineer Associate Exam Guidance
Exam Samples
Mock Exams

Cyber security

What is this Cyber Security Training about?

This program covers Ethical Hacking, Defensive Security (SOC/SIEM/EDR), and GRC. It is a highly practical, job-oriented training handled by real-time on-job experts.

Who can join this Cyber Security course?

Freshers, IT professionals, SOC aspirants, system engineers, developers, admins, and anyone who wants to build a career in Cyber Security.

What job roles can I get after completing this course?

Cyber Security Professional, Cyber Security Specialist, SOC Analyst, and SIEM Analyst.

What modules are included in the Cyber Security program?

Module 1: Ethical Hacking
Module 2: Defensive Security (SOC / SIEM / EDR)
Module 3: GRC (Governance, Risk & Compliance)

What Ethical Hacking topics will I learn?

Cybersecurity evolution, roles, Kali Linux, virtualization, footprinting, scanning, hacking phases, attacks, penetration testing, and red/blue/purple team concepts.

Does the course include networking foundations?

Yes. OSI model, TCP/IP, subnets, IPv4/IPv6, ports, firewalls, IDS/IPS, honeypots, Wi-Fi attacks, VPNs, routers, switches, proxies, NAC, and network types.

Will I learn Cryptography and Data Protection?

Yes. Symmetric/asymmetric encryption, hashing, certificates, PKI, SSL/TLS, IPsec, email security, key management, HSM, secure storage, cryptographic attacks, and compliance standards.

Is Pentesting covered in detail?

Yes. Bug bounty basics, Burp Suite, vulnerability scanners, web vulnerabilities, SQL injection, CSRF, IDOR, URL redirection, authentication bypass, and reporting.

Does the course include Cloud Security?

Yes. AWS, Azure, and GCP security fundamentals, shared responsibility model, cloud threats, API exploitation, identity attacks, privileging issues, and logging.

What SOC concepts will I learn?

SOC structure, Tier 1/2/3 roles, workflows, escalations, alert management, metrics, incident response phases, monitoring, and daily SOC operations.

Is SIEM taught in the training?

Yes. SIEM concepts, Splunk architecture, use case design, AQL/SPL queries, dashboards, alert rules, QRadar architecture, and MITRE ATT&CK mapping.

Will I learn Threat Hunting?

Yes. Alert enrichment, suppression, false positive handling, ticketing (ServiceNow, JIRA), and shift handover practices.

Is EDR included in the course?

Yes. SentinelOne architecture, agent capabilities, remote response actions like kill, quarantine, rollback, and endpoint threat detection workflows.

Will I learn Malware Analysis?

Yes. Malware types, infection behavior, static analysis, dynamic analysis, sandboxing tools (Any.run, Cuckoo), ProcMon, RegShot, TCPView, and forensic basics.

Does the course include IOC identification and analysis?

Yes. IOC extraction, reverse engineering introduction, disassemblers (Ghidra, IDA), debuggers, hash analysis, registry keys, malicious domains, and IOC mapping.

Will I learn Email Security?

Yes. Phishing, spear phishing, BEC, SPF, DKIM, DMARC, email flow, analysis tools (Defender, Cisco ESA, Proofpoint), and mailbox IOC checks.

Is Data Security & DLP included?

Yes. DLP for emails/files, rule writing, DLP tools (Proofpoint), reporting, and user awareness strategies.

Do you teach Threat Intelligence?

Yes. TI lifecycle, IOC formats, TI feeds (VirusTotal, OTX, Recorded Future, Shodan), MITRE ATT&CK usage, and incident reporting workflows.

Is GRC (Governance, Risk & Compliance) part of the syllabus?

Yes. Governance frameworks, ISMS, ISO 27001, NIST CSF, CIS controls, COBIT, risk assessment, BIA, risk treatment, audits, compliance management, policies, exceptions, and GRC reporting.

What is the duration of this Cyber Security course?

Each module is 30 hours. Total duration is 3 months as mentioned at the end of the PDF.

Training Modes

LIVE Online Training

Instructor Led

Self Paced Videos

 On-Demand

Corporate Training

With 100% Hands-On

Placement Partners

SQL School Fabric Data Engineer training certificate of completion issued in January 2026 with verification ID

SQL SCHOOL

24x7 LIVE Online Server (Lab) with Real-time Databases.
Course includes ONE Real-time Project.

Who is SQL School? How far you have been in the training services ?

SQL School is a registered training institute, established in February 2008 at Hyderabad, India. We offer Real-time trainings and projects including Job Support exclusively on Microsoft SQL ServerT-SQLSQL Server DBA and MSBI (SSISSSASSSRS) Courses. All our training services are completely practical and real-time. CREDITS of SQL School Training Center

  • We are Microsoft Partner. ID# 4338151
  • ISO Certified Training Center
  • Completely dedicated to Microsoft SQL Server
  • All trainings delivered by our Certified Trainers only
  • One of the few institutes consistently delivering the trainings for more than 20+ Years online as inhouse
  • Real-time projects in
    • Healthcare
    • Banking
    • Insurance
    • Retail Sales
    • Telecom
    • ECommerce

I registered for the Demo but did not get any response?

Make sure you provide all the required information. Upon Approval, you should be receiving an email containing the information on how to join for the demo session. Approval process usually takes minutes to few hours. Please do monitor your spam emails also.

Why you need our Contact Number and Full Name for Demo/Training Registration?

This is to make sure we are connected to the authenticated / trusted attendees as we need to share our Bank Details / Other Payment Information once you are happy with our Training Procedure and demo session. Your contact information is maintained completely confidential as per our Privacy Policy. Payment Receipt(s) and Course Completion Certificate(s) would be furnished with the same details.

What is the Training Registration & Confirmation Process?

Upon submitting demo registration form and attending LIVE demo session, we need to receive your email confirmation on joining for the training. Only then, payment details would be sent and slot would be allocated subject to availability of seats. We have the required tools for ensuring interactivity and quality of our services.

Please Note: Slot Confirmation Subject to Availability Of Seats.

How am I assured quality of the services?

We have been providing the Trainings – Online, Video and Classroom for the last 20+ years – effectively and efficiently for more than 100000 (1 lakh) students and professionals across USA, India, UK, Australia and other countries. We are dedicated to offer realtime and practical project oriented trainings exclusively on SQL Server and related technologies. We do provide 24×7 Lab and Assistance with Job Support – even after the course! To make sure you are gaining confidence on our trainings, participans are requested to attend for a free LIVE demo based on the schedules posted @ Register. Alternatively, participants may request for video demo by mailing us to contact@sqlschool.com Registration process to take place once you are happy with the demo session. Further, payments accepted in installments (via Paypal / Online Banking) to ensure trusted services from SQL School™

YES, We use Enterprise Edition Evaluation Editions (Full Version with complete feature support valid for SIX months) for our trainings. Software and Installation Guidance would be provided for T-SQL, SQL DBA and MSBI / DW courses.

Why Choose SQL School

  • 100% Real-Time and Practical
  • ISO 9001:2008 Certified
  • Weekly Mock Interviews
  • 24/7 LIVE Server Access
  • Realtime Project FAQs
  • Course Completion Certificate
  • Placement Assistance
  • Job Support