Program HighlightsPROGRAM

Foundations of Cybersecurity Program

Discover the fundamentals of cybersecurity. Learn how to develop an incident response action plan, and master the basics of hands-on security skills using key technologies.

Take your first step towards a career in cybersecurity and prepare for gaining a professional qualification in the subject in the future.  Discover the fundamentals of cybersecurity. Learn how to develop an incident response action plan, and master the basics of hands-on security skills using key technologies.

Take your first step towards a career in cybersecurity and prepare for gaining a professional qualification in the subject in the future. 

Foundations of Cybersecurity Program Highlights

  Course duration

Duration

  • 12 weeks, online
    5-6 hours/week
  Course Fee

Fee

US$ 155 - US$ 310

Course duration

Duration

  • 12 weeks, online
    5-6 hours/week
Course Fee

Fee

US$ 155 - US$ 310

Cybersecurity has become a critical requirement for every business, regardless of size. Cyber-attacks are increasing in number exponentially, particularly with the abundance of IoT devices. And whilst traditional firewall and authentication-based protection solutions are a good first line of defense, other approaches such as ‘assume compromise’ must now be included within a protection methodology. This means not only do cybersecurity experts need to master the technologies used to combat attacks, but they also need to understand, anticipate, and mitigate the ever-evolving vulnerabilities appearing day by day.

In this program you will be introduced to the fundamentals of cybersecurity, and the tools and methodologies used to recognize, defend, and prevent some of the most common forms of threat. You will master the basics of security services using PowerShell, Microsoft Advanced Threat Analytics, Microsoft Enterprise Threat Detection, Azure Active Directory, Windows Server 16, and SQL Server. You will discover how to plan an effective computer security incident response team (CSIRT). And you will develop a clear understanding of best practice protocol.

For individuals keen to take their first step in the important world of cybersecurity, this program is an ideal place to start.

This program comprises nine purposely designed courses that take you on a carefully defined learning journey.

It is a self-paced program, which means it is not run to a fixed schedule with regard to completing modules or submitting assignments. To give you an idea of how long the course takes to complete, it is anticipated that if you work 5-6 hours per week, you will complete the program in 12 weeks. However, as long as the program is completed by the end of your enrollment, you can work at your own pace. And you will be encouraged to stay connected with your learning community and mentors through the course discussion space.

The materials for modules are accessible from the start of the program and will remain available for the duration of your enrollment. Materials include videos, hands-on labs, exercises, and knowledge checks.

Enrollment in the program includes all nine courses. You cannot enroll for the courses separately.

As part of our mentoring service you will have access to valuable guidance and support throughout the program. We provide a dedicated discussion space where you can ask questions, chat with your peers, and resolve issues. Depending on the payment plan you have chosen, you may also have access to live classes and webinars, which are an excellent opportunity to discuss problems with your mentor and ask questions. Mentoring services may vary package wise.

Once you have successfully completed the program, you will earn your FutureSkills Prime Certificate of Participation.

You will:

  • Have an understanding of the fundamentals of enterprise cybersecurity.
  • Have an appreciation of the different types of cybersecurity threat.
  • Have an understanding of threat detection techniques, tools and methodologies.
  • Have an understanding of how to plan for a security incident response and build a computer. security incident response team (CSIRT).
  • Have in depth understanding of red team vs blue team exercises.
  • Be able to deploy and analyze PowerShell best practices.
  • Know how to manage network identities.
  • Know how to secure data in Microsoft Azure and SQL server.
  • Have an understanding of Windows 10 and Microsoft Azure security services.
  • Have an understanding of Windows Server 2016 security features.
  • This program is specifically aimed at individuals who are keen to gain an understanding of cybersecurity methodologies.
  • The skills introduced are valuable across every stage of advancement, from the college graduate looking to land their first career job, to an experienced developer seeking to expand their knowledge to include cybersecurity. 
  • A general understanding of the cloud and cloud services is beneficial.

This course is aligned with industry-approved occupational standards set by SSC NASSCOM. Once you’ve successfully completed this course, you will receive a cobranded FutureSkills Prime/SkillUp Online Certificate of Participation that confirms you have:

  • Job-ready competencies
  • Practical experience
  • Assessed technical knowledge

The national occupational standards to which this course is aligned relate to the following job roles:

  • Security Analyst 
  • Application Security Analyst
  • Identity and Access Management Analyst 
  • Endpoint Security Analyst 
  • Compliance Audit Analyst 
  • Security Operations Centre Analyst 
  • Penetration Tester 
  • Consultant Network Security 
  • Forensic specialist 
  • Security Infrastructure Specialist 
  • Identity and Access Management Architect

Program Outline

Topics Covered

  • Course topic

    Getting Started

Topics Covered

  • Course topic

    Welcome

Topics Covered

  • Course topic

    Basic Concepts of Networking

Topics Covered

  • Course topic

    Cybersecurity Definitions

  • Course topic

    Current Cybersecurity Landscape

  • Course topic

    Assume Compromise Philsophy

  • Course topic

    Cost of a breach

  • Course topic

    Module Exam

Topics Covered

  • Course topic

    Red Team versus Blue Team Exercises

  • Course topic

    The Attacker's Objective

  • Course topic

    Red Team Kill Chain

  • Course topic

    Document Vulnerabilities

  • Course topic

    Module Exam

Topics Covered

  • Course topic

    Blue Team

  • Course topic

    Blue Team Kill Chain

  • Course topic

    Restrict Privilege Escalation

  • Course topic

    Restrict Lateral Movement

  • Course topic

    Attack Detection

  • Course topic

    Module Exam

Topics Covered

  • Course topic

    CIA Triad

  • Course topic

    Organization Preparations

  • Course topic

    Developing and Maintaining Policies

  • Course topic

    Module Exam

Topics Covered

  • Course topic

    Final Exam

Topics Covered

  • Course topic

    Welcome

Topics Covered

  • Course topic

    An Overview of the Modern Cyber Threat Landscape

  • Course topic

    Basic Access Control Models

  • Course topic

    Integrating Pre-Breach and Post-Breach Approaches to Mitigate Cyber Threats

  • Course topic

    Comparing signature-based and behavioral heuristic detection methods

  • Course topic

    Combating threat persistence

  • Course topic

    Penetration Testing

  • Course topic

    Posture Testing

  • Course topic

    Ethical Hacking

  • Course topic

    Module Exam

  • Course topic

    Subsection

Topics Covered

  • Course topic

    Windows Event Forwarding and intrusion detection

  • Course topic

    Microsoft Advanced Threat Analytics (ATA)

  • Course topic

    Windows Defender Advanced Threat Protection (ATP)

  • Course topic

    Microsoft Enterprise Threat Detection

  • Course topic

    Microsoft Security Risk Detection

  • Course topic

    AntiMalware Scan Interface (AMSI)

  • Course topic

    Logging and Auditing

  • Course topic

    Threat Detection Tools

  • Course topic

    Module Exam

Topics Covered

  • Course topic

    Microsoft Cloud App Security and Office 365 Cloud App Security

  • Course topic

    Office 365 Advanced Threat Protection

  • Course topic

    Office 365 Threat Intelligence

  • Course topic

    Azure Advanced Threat Detection

  • Course topic

    Azure Logging and Auditing

  • Course topic

    Microsoft Enterprise Mobility + Security (EMS)

  • Course topic

    Microsoft 365

  • Course topic

    Module Exam

Topics Covered

  • Course topic

    Layered Machine Learning defenses in Windows Defender Antivirus

  • Course topic

    Detecting persistent threats by using Windows Defender ATP

  • Course topic

    Enterprise Threat Detection behavioral monitoring

  • Course topic

    Microsoft comprehensive approach to cyber threat detection

  • Course topic

    Module Exam

Topics Covered

  • Course topic

    Final Exam

  • Course topic

    Lab

Topics Covered

  • Course topic

    Welcome to This Course

Topics Covered

  • Course topic

    Introduction

  • Course topic

    NIST-Framework

  • Course topic

    Prepare

  • Course topic

    Module Review

  • Course topic

    Module Exam

Topics Covered

  • Course topic

    Building a Secuirty Incident Response Team

  • Course topic

    Preparation

  • Course topic

    Module Exam

Topics Covered

  • Course topic

    Introduction

  • Course topic

    Practice Security Incident Response Report

Topics Covered

  • Course topic

    Final Exam

Topics Covered

  • Course topic

    Welcome

Topics Covered

  • Course topic

    Windows PowerShell Architecture

  • Course topic

    Powershell editions and versions

  • Course topic

    Running Windows PowerShell

Topics Covered

  • Course topic

    Managing Local Script Execution with Windows PowerShell Execution Policy

  • Course topic

    Managing Remote Execution Capabilities of Windows PowerShell

  • Course topic

    Constrained Endpoints

  • Course topic

    Language Mode

  • Course topic

    Anti-Malware Scan Interface (AMSI)

Topics Covered

  • Course topic

    Windows PowerShell DSC

  • Course topic

    Just Enough Administration (JEA)

  • Course topic

    Windows PowerShell Auditing and Logging

Topics Covered

  • Course topic

    Windows PowerShell-based attacks

  • Course topic

    Windows PowerShell-based security tools

  • Course topic

    Summary of Windows PowerShell-based security-related technologies

Topics Covered

  • Course topic

    Final Exam

Topics Covered

  • Course topic

    Getting Started

Topics Covered

  • Course topic

    Identity as a Service (IaaS), the new Control Plane

  • Course topic

    Security Privileged Access Roadmap: Stage 2

  • Course topic

    Module Exam

Topics Covered

  • Course topic

    Active Directory Security

  • Course topic

    Module Exam

Topics Covered

  • Course topic

    Identity Federation and Access Solutions for the Cloud

  • Course topic

    Azure Security Architecture

  • Course topic

    Module Exam

Topics Covered

  • Course topic

    Introduction

  • Course topic

    Authentication and Authorization in Active Directory

  • Course topic

    Module Exam

Topics Covered

  • Course topic

    Final Exam

  • Course topic

    Module 5 - Labs

Topics Covered

  • Course topic

    Welcome

  • Course topic

    Hands-On Lab Environment

Topics Covered

  • Course topic

    Authenticating Connections to SQL Server

  • Course topic

    Authorizing Logins to Connect to Databases

  • Course topic

    Module Exam

Topics Covered

  • Course topic

    Working with Server Roles

  • Course topic

    Working with Database Roles

  • Course topic

    Authorizing User Access to Objects

  • Course topic

    Module Exam

Topics Covered

  • Course topic

    Options for Auditing Data Access in SQL Server

  • Course topic

    Implementing SQL Server Audit

  • Course topic

    Module Exam

Topics Covered

  • Course topic

    Protecting Data With Encryption

  • Course topic

    Module Exam

Topics Covered

  • Course topic

    Securing Data in SQL Server

Topics Covered

  • Course topic

    Final Exam

Topics Covered

  • Course topic

    Introduction

Topics Covered

  • Course topic

    Evolution of attacks

Topics Covered

  • Course topic

    Secure boot and Unified Extensible Firmware Interface

  • Course topic

    Module Exam

Topics Covered

  • Course topic

    Built-in Windows 10 defenses

  • Course topic

    Module Exam

Topics Covered

  • Course topic

    Additional built-in software security features

  • Course topic

    Module Exam

Topics Covered

  • Course topic

    Windows 10 Creator Update

  • Course topic

    Ransomware Case Study

  • Course topic

    Module Exam

Topics Covered

  • Course topic

    Final Exam

Topics Covered

  • Course topic

    Welcome to This Course

Topics Covered

  • Course topic

    Server Hardening

  • Course topic

    Service Configuration

  • Course topic

    Account Configuration

  • Course topic

    Remote Administrative Access

  • Course topic

    Application Restriction

  • Course topic

    Firewall Configuration

  • Course topic

    Software Updates

  • Course topic

    Configuration Baselines

Topics Covered

  • Course topic

    Restricting Administrator Access

  • Course topic

    LAPS

  • Course topic

    Credential Guard

  • Course topic

    NTLM blocking

  • Course topic

    Protected Users

  • Course topic

    Authentication Policy Silos

  • Course topic

    Just Enough Administration

  • Course topic

    ESAE forests

  • Course topic

    Just in Time Administration

Topics Covered

  • Course topic

    Introduction to Containers

  • Course topic

    Container Types

  • Course topic

    Container Dependencies

  • Course topic

    Managing Container Images

  • Course topic

    Docker

  • Course topic

    Container Security Benefits

  • Course topic

    Containers versus VMs

Topics Covered

  • Course topic

    Secure Virtualization Workload

Topics Covered

  • Course topic

    Final Exam

Topics Covered

  • Course topic

    Welcome

Topics Covered

  • Course topic

    Azure Security Services

  • Course topic

    Video Introduction to Azure Network Security

  • Course topic

    Azure Public Cloud Services

  • Course topic

    Azure Networking

  • Course topic

    Network Access Control

  • Course topic

    Secure Remote Access and Cross Premises Connectivity

  • Course topic

    Video VNET Peering

  • Course topic

    Availability

  • Course topic

    Name Resolution

  • Course topic

    DMZ Architectures

  • Course topic

    Monitoring and Threat Detection

  • Course topic

    Module Summary

  • Course topic

    Module Exam

Topics Covered

  • Course topic

    Cloud Adoption changes

  • Course topic

    Dynamic cloud environments

  • Course topic

    Services in the cloud

  • Course topic

    Shared Responsibility for Security

  • Course topic

    Azure Security Center

  • Course topic

    Azure Security Center Case Study

  • Course topic

    Azure Backup

  • Course topic

    Azure Log Analytics

  • Course topic

    Module Exam

Topics Covered

  • Course topic

    Azure Application Gateway

  • Course topic

    Azure Disk and Storage Encryption

  • Course topic

    Data Security and Encryption Best Practices

  • Course topic

    Module Exam

Topics Covered

  • Course topic

    Understanding Microsoft Intune

  • Course topic

    Device Health Attestation

  • Course topic

    Security Aspects of Windows AutoPilot

  • Course topic

    Module Exam

Topics Covered

  • Course topic

    Final Exam

  • Course topic

    Final Lab

Topics Covered

  • Course topic

    NASSCOM Certificate

Course Certificate

Earn your certificate

Once you have completed this program, you will earn your certificate.

FAQs

Absolutely. FutureSkills Prime courses are an excellent introduction to a subject. Check the course overview page to understand if you need any experience in the subject before enrolling, but most FutureSkills Prime courses require no previous knowledge to enroll. You will, however, require basic skills in math. But be assured that all FutureSkills Prime courses are a great way to discover the basics of a subject. 

Yes. The skills required to be a cybersecurity specialist are in high demand. Many countries are currently experiencing a skills shortage in this area, thus choosing to build a career in this field should present you with great employment opportunities.  

The average salaries for different roles are highly competitive and individuals working in cybersecurity are well remunerated. You also don’t need to have a degree in the subject to launch your career. Plus, work can often be carried out remotely, thus there are fewer barriers to finding a position in this arena than for those vacancies that require you to work in an office.   

Foundations of Cybersecurity has been designed for students and learners who have no experience in the field of cybersecurity at all; you do not need to have worked in a cybersecurity role or have any previous knowledge. This program, therefore, provides an excellent introduction to the subject. Please be aware, though, that you do need basic math skills to be able to progress through the program. 

This FutureSkills Prime program is a self-paced program, which means it is not run to a fixed schedule with regard to completing modules or submitting assignments. As long as the program is completed by the end of your enrollment, you can work at your own pace. And don’t worry, you’re not alone. You will be encouraged to stay connected with your learning community and mentors through the program discussion space. 

The materials for each module are accessible from the start of the program and will remain available for the duration of your enrollment. Methods of learning and assessment will include videos, reading material, and knowledge checks.  

Once you have successfully completed the course, you will earn your Certificate of Completion. 

Yes, once you have successfully completed the program, you will earn a Certificate of Completion.