Phase #1
Introduction to Cybersecurity
This part serves as an introduction to the fundamentals of cybersecurity, providing participants with a comprehensive overview of the digital landscape and its significance in contemporary society.
This is the first phase of the Career in Cybersecurity course. This module delves into the fundamental concepts of cybersecurity, addressing possible career paths, terminology, legal frameworks and ethical principles governing the field.
MODULE #1
Fundamentals of Cybersecurity
Equip participants with the knowledge necessary for understanding and operating in the field of cybersecurity.
Introduction to
Cyberspace
Understanding the digital environment and its significance in the modern world.
Career in
Information Security
Career paths and opportunities for advancement.
Basic Concepts
and Terminology
Key terms and concepts used in cybersecurity.
Legal
Framework
Overview of relevant laws and regulations related to cybersecurity.
Ethical
Principles
Learning about ethical standards and codes of conduct in the field of cybersecurity.
Phase #2
Mastering the Cybersecurity Landscape
Upon completing Phase 1, participants will have a foundational understanding of the digital environment and a solid grasp of the legal and ethical principles relevant to cybersecurity.
The next phase of the program offers a comprehensive exploration of three key cybersecurity areas.
Participants will delve into the following modules:
- Information Security Management:
- Defensive Cybersecurity Operations:
- Offensive Cybersecurity Operations:
This approach fosters a deep understanding of cybersecurity, preparing them to tackle diverse challenges and roles within the industry.
Select Module:
MODULE #1
Information Security Management
Participants will acquire the essential foundational knowledge, and by reviewing additional recommended resources, they’ll be well-prepared for junior roles in the cybersecurity management domain such as Information Security Officer (Information Security Management System, GRC). participants with the knowledge necessary for understanding and operating in the field of cybersecurity.
Classification and
Protection of Information
Various types of information and methods for their protection.
Information Security
Management System
(ISMS)
Introduction and key components of ISMS.
Regulatory and
International Frameworks
Alignment with standards such as ISO 27001, GDPR, PCI-DSS, and other relevant frameworks.
Development and
Implementation of Policies
Creation and application of security policies and procedures.
Risk
Management
Identification, analysis, and treatment of risks.
Security Culture and
HR Management
Promoting security awareness and best practices in team management.
Technical Aspects
of Security
- Introduction to computer, network, and critical infrastructure security.
- Fundamentals of data protection and privacy.
Continuous
Improvement
Additional education, training, and specialized courses.
Mentor
MODULE #2
Defensive Cybersecurity Operations
Participants will acquire the essential foundational knowledge, and by reviewing additional recommended resources, they’ll be well-prepared for junior roles in the defensive cybersecurity domain (blue team) such as Security Analyst (Response to security incidents, SOC – Blue team) and Information Security Engineer (Implementation of security controls, Blue team).
Cybersecurity Engineer
Security Models,
Principles, and Practices
- Understanding the basic models and principles of cybersecurity (defense in depth, zero trust)
- Studying industry best practices (network security, endpoint security, e-mail security, web security, threat hunting, endpoint detection and response).
Introduction to
Cryptography and
Its Application
Basics of cryptographic techniques and their practical use.
Identity, Access, and
Authentication
Management
Methods for protecting identity and access to information (authentication, authorization, single sign-on).
Cloud Security
and Protection
Techniques and strategies for protecting data in the cloud.
Vulnerability
Management, Patching,
and Implementation
Vulnerability Management, Patching, and Implementation
Cybersecurity Analyst
Collection, Analysis,
and Interpretation of
Security Data
Collection, Analysis, and Interpretation of Security Data
Tools, Frameworks,
and Techniques for
Efficient Cybersecurity
Operations
Security Operations Center (SOC) tools: SIEM, SOAR, EDR, XDR. Fundamentals of MITRE and ATT&CK frameworks. Triage of security incidents.
Incident Response Automation and Crisis Management
Strategies and techniques for effectively responding to incidents.
Continuous Improvement and Specialization
- Additional Education, Training, and Specialized Courses in Defensive Cybersecurity
- Recommendations for further improvement and specialization in the field of cybersecurity.
Mentor
Information security engineer, highly certified and professionally trained. Ivan has been safeguarding information systems across diverse IT environments for over 13 years.
Holding a Specialist of Applied Computer Science degree. Certifications: GIAC Network Penetration Tester, Cisco Cyber Ops, and Microsoft 365: Security Administrator Associate.
MODULE #3
Offensive Cybersecurity Operations
Participants will acquire the essential foundational knowledge, and by reviewing additional recommended resources, they’ll be well-prepared for junior roles in the offensive cybersecurity domain (red team) such as Penetration Tester (Security Testing, Red team).
Introduction to Offensive
Cybersecurity Operations
- Fundamentals of Red Teaming, Penetration Testing, and Offensive Security Engineering.
- The mindset, techniques, and tools for offensive cybersecurity operations.
Techniques and Methods
of Offensive Security
- Open Source Intelligence (OSINT) and information gathering techniques.
- Phishing tactics, techniques, and prevention.
- Network security testing and vulnerability identification.
- Testing and protecting web applications from cyber attacks.
Programming and
Security
- Security from a developer’s perspective and coding best practices.
- Capture The Flag (CTF) challenges, Penetration Testing exercises, and practical simulations.
Hands-On Offensive Security Training
Capture The Flag (CTF) challenges, Penetration Testing exercises, and practical simulations.
Continuous Improvement
and Specialization
Additional education, training, and specialized courses in the field of offensive security.
Mentors
Offensive security engineer with 7+ years of software engineering background, specializing in web and network penetration testing. Highly engaged in red teaming, drone security, and developing offensive security software.
Certifications: CEH, DSOC, eJPT, C2 development in C#, MCSD
Seasoned cybersecurity expert with over 6 years of experience, Damjan has transitioned from being an elite penetration tester into a role of governing information security systems. Renowned in the cybersecurity field in Serbia, he currently serves as the Information Security Officer at UN1QUELY.
Certifications: OSCP, Security+, eMAPT, VHL Advanced+, and CISM.
course information
Start a Career in Cybersecurity
Benefits
Let’s run through everything you’ll get once you
enroll in this course:
Personalized Approach
A program tailored to your needs and current skills. Our training is flexible and modular, allowing you to choose the pace, intensity, and specialization that best fits you.
Experienced Mentors
Gain access to unparalleled knowledge and insights. Our instructors are experts working across various fields of cybersecurity, giving you a glimpse into the best practices and current trends in the industry.
Hands-on Skills
Equipping you for the real world. Our curriculum focuses on real-life scenarios and challenges faced by cybersecurity professionals, prepping you to tackle them efficiently and professionally.
Guide to Successful Employment
Our mentors will share invaluable insights about what employers in this sector are looking for, helping you stand out and simplifying your job search.
Multiple Specializations
Allowing you to pursue your passion. Our academy offers you the chance to focus on different areas of cybersecurity, whether it’s defensive, offensive, or managerial roles.
Cybersecurity Community
Here, you can exchange experiences, meet new friends and collaborators, and stay connected with our network of experts who’ll offer regular updates on emerging threats and solutions.
Stay One Step Ahead
of Cyber Threats
Start a career in cybersecurity with
UN1QUELY’s Cybersecurity Academy.