| 1 |
- |
Introduction to Cyber Security
Basic concepts, cybersecurity landscape, course overview |
- |
| 2 |
- |
Information Security Principles
Confidentiality, Integrity, Availability (CIA Triad) |
- |
| 3 |
- |
Cyber Threats and Attacks
Malware, phishing, social engineering, DoS/DDoS attacks |
- |
| 4 |
- |
Vulnerabilities and Risk Management
Threat modeling, risk assessment, mitigation strategies |
- |
| 5 |
- |
Network Security Fundamentals
Firewalls, IDS/IPS, VPNs, network defense mechanisms |
- |
| 6 |
- |
Cryptography and Encryption
Symmetric and asymmetric encryption, hashing, digital signatures |
- |
| 7 |
- |
Authentication and Access Control
Passwords, multi-factor authentication, authorization models |
- |
| 8 |
- |
Operating System Security
User privileges, patch management, system hardening |
- |
| 9 |
- |
Web and Application Security
Web vulnerabilities (SQL injection, XSS), secure coding basics |
- |
| 10 |
- |
MID-TERM EXAM |
- |
| 11 |
- |
Cloud Security
Cloud computing risks, shared responsibility model |
- |
| 12 |
- |
Cyber Security Policies and Standards
ISO/IEC 27001, security frameworks, organizational policies |
- |
| 13 |
- |
CLegal, Ethical, and Social Issues in Cyber Security
Cyber laws, data protection, privacy, ethics |
- |
| 14 |
- |
Current Trends and Future Challenges in Cyber Security
Artificial intelligence in security, zero trust, course evaluation |
- |
| 15 |
- |
Current Trends and Future Challenges in Cyber Security
Artificial intelligence in security, zero trust, course evaluation |
- |
| 16 |
- |
FINAL EXAM |
- |
| 17 |
- |
FINAL EXAM |
- |