- What is Cybersecurity
- Difference between Offensive and Defensive Security
- Difference between Ethical Hacking and Cybersecurity
- Importance of Cybersecurity for Organizations
- Career Opportunities in Cybersecurity
- Various Domains in Cybersecurity
- Salaries and Growth in Cybersecurity
- What is Networking
- Types of Networks
- How Communication Happens over Networks
- OSI Model – Deep Understanding
- TCP/IP Model
- IP Addressing (IPv4 & IPv6)
- Static vs Dynamic IP
- Subnetting
- MAC Address
- Network Topologies & Types
- Router, Switch, Hub, Bridge
- DNS – Deep Understanding
- Ports & Their Usage
- Protocols Overview
- Encryption & Decryption Concepts
- How DHCP Works
- What is NAT & PAT
- TCP 3-Way Handshake
- CIA Triad
- Cyber Kill Chain
- Incident Response Plan
- Attack Types & Patterns
- Ethical Hacking Steps
- Website Architecture
- How SSL & TLS Work
- HTTP Error Response Codes
- How DNS Works over the Web
- Deep Understanding of OWASP Top 10 Vulnerabilities
- Windows Security
- Active Directory
- WAF (Web Application Firewall)
- IDS / IPS
- Antivirus & Endpoint Protection
- Firewalls
- Proxy & VPN
- Cloud Security Devices
- Linux Servers
- MFA Devices
- Load Balancers
- What is SOC
- What is SIEM
- Use of SIEM Tools
- Popular SIEM Tools in the Market
- SIEM Functions
- SIEM Architecture
- How Logs Flow to SIEM Tools
- MITRE ATT&CK Framework
- Practical Investigation of Security Device Logs
- In-depth Investigation using AI Tools
- Strategies to Get Multiple Interview Calls
- Optimizing Your Resume for Cybersecurity Roles
- Building a Professional Network
- Interview Preparation Tips