Cyber Security Course

Step into cyber security with our all-encompassing cyber security course, offering cyber security training online and tangible certifications.

img10 Modules

img2 - 3 Months

Overview
Course Description

The Tek-z cyber security course is designed to arm you with in-demand cyber security certifications, practical skills in vulnerability assessment, ethical hacking, and defense strategies. This cyber security course online provides learners with flexible cyber security training led by seasoned professionals and hands-on experience through online classes for cyber security.

What you'll learn
  • Principles of cyber security and threat landscape
  • Ethical hacking and penetration testing
  • Network & application security
  • Security operations and incident response
  • Security compliance and best practices
  • Preparation for leading cyber security certifications
Course Features:
  • Cyber security certifications course guidance
  • Virtual labs and real-world security scenarios
  • Cyber security training online with interactive challenges
  • Career mentorship and resume building
  • 24/7 access to learning resources
Course Content

Definition, importance, and scope

Types of Cyber Threats

Basic Concepts of CIA

Cybersecurity Ethics, Principles and Best Practices

Basic commands

Networking commands

Service and logs.

System Administration Commands

Linux File system / Directory’s

Access Control Types, Permissions, and UAC

Windows Firewall and Windows Defender

Windows Remote Management and RDP

Basic CMD Commands and Batch Scripting

Introduction to PowerShell

Using CMD and PowerShell for System

Administration and Basic Security Tasks

Types of networks

Understanding network topologies

Introduction to Network Protocols and Ports

IP Addressing and Subnetting

Firewall and its configuration.

Footprinting, Reconnaissance, and Enumeration

Vulnerability Assessment and Reporting

Windows and Linux System Hacking

Password Cracking and hashing

Wireshark and Network testing

Wireless Network Hacking

Digital Forensics

Cloud Computing and Security AWS/Azure

Tor, Anonymous and Proxy service’s

Introduction to Web Hacking

Introduction to Burp Suite

Fuzzing & Directory Enumeration

Subdomain Enumeration

Authentication Bypass

File inclusion Vulnerability

File upload vulnerability

Cross-site Scripting XSS

Command Injection

Sql Injection

OWASP TOP 10-2021

Security Operations Center (SOC)

Security Incident and Event Management SIEM)

Tools, installation, and configuration

Building IDS, Firewalls, and Honeypots

Deployment and monitoring

Documenting and Reporting.

Blue Team Defense.

Red Team Offensive testing

Purple Team Organization Task.

OWASP TOP 10-2021

Attacking real world Vulnerable Service’s

Testing web application for Vulnerability Finding

Anonymity, Dark web, and secure communication.

Comprehensive Security Checklists for Auditing,testing

Enroll Now

Certify Your Success

Courses Pricing Plans

Self-Starter Plan

Interactive Learning with Mentors

5,999

Enroll now to enjoy extra early bird discounts!

Saviour Plan

Recorded Sessions

Certifications

Hands-on Projects

Enroll Now
Mentor-Led Plan

For those who thrive with live interaction and guidance.

8,999

Enroll now to enjoy extra early bird discounts!

All benefits of Self-Starter Plan

Live Sessions

Doubt Clearing Sessions


Enroll Now
Pro Career Launchpad

For job-focused learners ready to break into the industry.

11,999

Enroll now to enjoy extra early bird discounts!

All benefits of Self-Starter Plan + Mentor-Led Plan

Placement Assistance

Mock interview

Session with Co-founders

Enroll Now