Modern Cybersecurity Practices

Learn, practice, and reskill because the best defense is a well-trained mind.

(CYBERSEC.AW1) / ISBN : 978-1-64459-656-2
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

About This Course

Join our modern Cybersecurity course that takes you through the highs and lows of protecting a digital empire. 

Through a gripping lesson plan, you’ll witness the complete takeover of a company’s network, learning how attackers exploit vulnerabilities, steal sensitive data, and leave chaos in their wake. 

Then, step into the defender’s shoes as you design, implement, and monitor a robust cybersecurity program tailored to real-world challenges. 

Explore modern methodologies, tools, and strategies, from threat hunting to active monitoring, that will sharpen your skills and improve your cybersecurity posture. 

Skills You’ll Get

  • Learn to identify and analyze potential cybersecurity threats and vulnerabilities in a network.
  • Gain hands-on experience in understanding how attackers infiltrate, exploit, and exfiltrate data from a network.
  • Design and implement a tailored cybersecurity program based on specific organizational needs.
  • Master strategies to assess, mitigate, and manage cybersecurity risks.
  • Deploy and manage security controls to protect systems and data.
  • Respond to and recover from cybersecurity incidents, including data breaches and network compromises.
  • Proactively invest time and resources in threat hunting.
  • Create disaster recovery and business continuity plans so the company can continue during and after a cyber incident.
  • Get hands-on experience with industry-standard cybersecurity tools, including firewalls, IDS/IPS, and endpoint protection solutions.

1

Preface

2

What's at Stake?

  • Some Statistics
  • A Common Enemy, Improper Input Validation
  • Conclusion
  • Questions
3

Example Attack - The Initial Breach

  • Company X - not that secure
  • The exposure
  • The Vulnerability
  • Conclusion
  • Questions
4

Example Attack - Lateral Movement

  • Admin in the cloud - what can go wrong...?
  • Adding our tools to the cloud
  • Exploring the local network segment
  • Using Credential Stuffing on Company X
  • Attacking TESTSERVER-WEB1
  • Finding User Credentials on a Compromised System
  • Moving to the Next System
  • Conclusion
  • Questions
5

Example Attack - Data Exfiltration

  • What are we doing here?
  • What's in a database?
  • Exploring the sales web server for clues
  • Getting the Goodies
  • Conclusion
  • Questions
6

Example Attack - Going Out with a Bang

  • Attack recap
  • What else can be done with a foothold in the network?
  • NotPetya
  • Executing a payload on a group of computers
  • Sealing company X's fate
  • Conclusion
  • Questions
7

Scrutinizing the Example Attack

  • Security Issue 1: Not Properly Implemented Network Architecture Design
  • Security Issue 2: Secure System Build and Change Management Practices
  • Security Issue 3: IDS, IPS, and Endpoint Protection Systems
  • Security issue 4: Credential management
  • Security issue 5: User privilege management, privilege creep
  • Security Issue 6: Security Monitoring
  • Conclusion
  • Questions
8

Adhere to a Security Standard

  • What is the security standard?
  • Common security standards
  • NERC
  • Security standards for Operation Technology (OT) Space
  • How To Pick A Standards Framework?
  • A Fitting Standard for Company X's Security Program
  • Setting Goals and Expectations for the Security Program
  • Conclusion
  • Questions
9

Defining Security Policies, Procedures, Standards, and Guidelines

  • Risk
  • Common security policies
  • Company X - Security Standards
  • Company X - Security Procedures
  • Document Storage and Management
  • Conclusion
  • Questions
10

Kicking Off the Security Program

  • Risk management and risk assessments
  • Conclusion
  • Questions
11

Passive Security Monitoring

  • Security Incidents
  • Event Logs
  • Network Traffic Packet Captures
  • Firewalls and IDS/IPS
  • The Microsoft Azure Sentinel SIEM
  • Conclusion
  • Questions
12

Active Security Monitoring

  • What is vulnerability management?
  • Actively looking for vulnerabilities
  • Going over the scan results
  • Conclusion
  • Questions
13

Threat Hunting

  • What is threat hunting?
  • Information needed for the job
  • Splunk
  • ELK Stack
  • Areas of interest - Hunting exercises
  • Network activity
  • Conclusion
  • Questions
14

The Continuous Battle

  • Recap of our efforts so far
  • Manage risk by defining a reoccurring security program cycle
  • What if things do go wrong? - Incident handling
  • What Else Can Be Done to Improve One's Security Program and Posture?
  • Conclusion
  • Questions

Any questions?
Check out the FAQs

  Want to Learn More?

Contact Us Now

This modern cybersecurity practices course is ideal for aspiring cybersecurity professionals, IT administrators, system engineers, and anyone looking to upskill or reskill in modern cybersecurity practices. 

Being one of our best cybersecurity courses for beginners, it is self-paced, but most learners complete it in 4 months by dedicating 7-10 hours per week. 

Absolutely! You’ll gain hands-on experience with industry-standard tools like firewalls, IDS/IPS, endpoint protection solutions, and monitoring platforms. 

Yes, you’ll have lifetime access to the course material, including updates and additional resources, until the course expires.

Related Courses

All Course
scroll to top