Course Syllabi
- Network+ Syllabus
- Security+ Syllabus
- Certified Ethical Hacker Sylabus
- Certified Network Defender Sylabus
- Desktop Support Program
- Cybersecurity Engineer Program
- Penetration Tester Program
- Data Analytics with Python Program
Total Cyber Network+ Syllabus
The Network+ course is five (5) weeks long with 45 hours of Live Instructor-led course and hands-on Instructor-led Labs plus Q and A sessions. The course is led by knowledgeable Instructors and includes the online course of instruction, eBook, Instructor-led Labs as well as Instructor/SME-led question and answer sessions. Instructor will display demos and additional material to better prepare the student for both the exam and content material.
Week 1
Day 1
Course Introduction
- Introduction to Total Cyber and the Network+ course
- CompTIA MasterCert Registration
- Exam Expectations and Review of Material
Lesson 1: Explaining the OSI and TCP/IP Models
- Topic A: Explain OSI Model Layers
- Topic B: Explain the TCP/IP Suite
Lesson 2: Explaining Properties of Network Traffic
- Topic A: Explain Media Types and Access Methods
- Topic B: Deploy Ethernet Standards
- Topic C: Configure and Monitor Network Interfaces
- LAB: Exploring the Lab Environment
- LAB: Configuring Ethernet Networking
Day 2
Lesson 3: Installing and Configuring Switched Networks
- Topic A: Install and Configure Hubs and Bridges
- Topic B: Install and Configure Switches
- Topic C: Compare and Contrast Network Topologies
- Topic D: Compare and Contrast Network Types
- LAB: Designing a Switch Topology
Day 3
Lesson 4: Configuring IP Networks
- Topic A: Configure IPv4 Addressing Components
- Topic B: Test IP Interfaces with Command Line Tools
- LAB: Configuring IPv4 Networking
- Topic C: Configure IPv4 Subnets
- LAB: Designing an IP Subnet
- LAB: Configuring IPv4 Subnets
- Topic D: Configure Private and Public IPv4 Addressing Schemes
- LAB: Designing VLSM Subnets
Day4
Lesson 4: Configuring IP Networks
- Topic E: Configure IPv6 Addressing Components
- LAB: Configuring IPv6 Networking
- Topic F: Configure DHCP Services
- LAB: Configuring Address Assignments
- Topic E: Configure IPv6 Addressing Components
Lesson 5: Installing and Configuring Routed Networks
- Topic A: Explain Characteristics of Routing
- LAB: Designing a Branch Office Internetwork
- Topic B: Install and Configure Routers
- LAB: Configuring Routing
- Topic A: Explain Characteristics of Routing
Week 2
Day 1
Lesson 6: Configuring and Monitoring Ports and Protocols
- Topic A: Explain the Uses of Ports and Protocols
- Topic B: Use Port Scanners and Protocol Analyzers
- LAB: Using Port Scanning Tools
- Topic C: Explain the Use of Name Resolution Services
- Topic D: Configure DNS and IPAM Services
- LAB: Configuring DNS Servers
Day 2
Lesson 7: Explaining Network Application and Storage Services
- Topic A: Explain the Uses of Network Applications
- LAB: Configuring Application Protocols
- Topic B: Explain the Uses of Voice Services and Advanced Networking Devices
- Topic C: Explain the Uses of Virtualization and Network Storage Services
- Topic D: Summarize the Concepts of Cloud Services
- Topic A: Explain the Uses of Network Applications
Day 3
Lesson 8: Monitoring and Troubleshooting Networks
- Topic A: Monitor Network Interfaces and Logs
- LAB: Using Event Management and Performance Monitors
- Topic B: Explain Network Troubleshooting Methodology
- Topic C: Troubleshoot Common Network Services Issues
- LAB: Troubleshooting Network Issues
- Topic A: Monitor Network Interfaces and Logs
Day 4
Lesson 9: Explaining Networking Attacks and Mitigations
- Topic A: Summarize Common Networking Attacks
- Topic B: Explain the Characteristics of VLANs
- Topic C: Explain the Characteristics of NAT and Port Forwarding
Lesson 10: Installing and Configuring Security Devices
- Topic A: Install and Configure Firewalls and Proxies
- LAB: Configuring a NAT Firewall
- Topic B: Explain the Uses of IDS/IPS and UTM
- Topic A: Install and Configure Firewalls and Proxies
Day 5
Lesson 11: Explaining Authentication and Access Controls
- Topic A: Explain Authentication Controls and Attacks
- Topic B: Explain the Uses of Authentication Protocols and Directory Services
- LAB: Securing Appliance Administration with RADIUS Authentication
- Topic C: Explain the Uses of Port Security and NAC
- Topic D: Implement Network Device Hardening
- Topic E: Explain Patch Management and Vulnerability Scanning Processes
Week 3
Day 1
Lesson 12: Deploying and Troubleshooting Cabling Solutions
- Topic A: Deploy Structured Cabling Systems
- Topic B: Deploy Twisted Pair Cabling Solutions
- Topic C: Test and Troubleshoot Twisted Pair Cabling Solutions
- Topic D: Deploy Fiber Optic Cabling Solutions
Lesson 13: Implementing and Troubleshooting Wireless Technologies
- Topic A: Install and Configure Wireless Technologies
- Topic B: Troubleshoot Wireless Performance Issues
- Topic C: Secure and Troubleshoot Wireless Connectivity
- LAB: Configuring a Wireless Router
Day 2
Lesson 14: Comparing and Contrasting WAN Technologies
- Topic A: Compare and Contrast WAN Core Service Types
- Topic B: Compare and Contrast WAN Subscriber Service Types
- Topic C: Compare and Contrast WAN Framing Service Types
- Topic D: Compare and Contrast Wireless and IoT WAN Technologies
Lesson 15: Using Remote Access Methods
- Topic A: Use Remote Access VPNs
- Topic B: Use Remote Access Management Methods
- LAB: Configuring Secure Access Channels
Day 3
- Lesson 16: Identifying Site Policies and Best Practices
- Topic A: Manage Networks with Documentation and Diagrams
- Topic B: Summarize the Purposes of Physical Security Devices
- Topic C: Compare and Contrast Business Continuity and Disaster Recovery Concepts
- Topic D: Identify Policies and Best
Week 4
Day 1
Remedial Review of lessons covered.
- Q&A with Instructor
- Additional Lab environments through CompTIA and Instructor demo
- Practice Exam
Day 2
Remedial Review of lessons
- Q&A with Instructor
- Additional Lab environments through CompTIA and Instructor demo
- Practice Exam
Day 3
Remedial Review of lessons covered.
- Q&A with Instructor
- Additional Lab environments through CompTIA and Instructor demo
- Practice Exam
Day 4
Remedial Review of lessons covered.
- Q&A with Instructor
- Additional Lab environments through CompTIA and Instructor demo
- Practice Exam
- Exam Review/Expectations
Total Cyber Security+ Course Syllabus
The Security+ course is five (5) weeks long with 45 hours of Live Instructor led course and hands-on Instructor led Labs plus and Q and A sessions. The course is led by knowledgeable Instructors and include the online course of instruction, eBook and Hard cover book, Instructor led Labs as well as Instructor/SME led question and answer sessions.
Domain 1.0 Threats, Attacks and Vulnerabilities
1.1 Given a scenario, analyze indicators of compromise and determine the type of malware.
1.2 Compare and contrast types of attacks
1.2.1 Social Engineering
1.2.2 Application / Service attacks
1.2.3 Cryptographic attacks
1.2.4 Hijacking
1.2.5 Network / Wireless attacks
1.3 Explain threat actor types and attributes
1.3.1 Types of actors
1.3.2 Attributes of actors
1.4 Explain penetration testing concepts
1.4.1 Penetration testing process
1.4.1.1 Reconnaissance
1.4.1.2 Initial exploitation
1.4.1.3 Persistence
1.4.1.4 Pivot
1.4.1.5 Escalation of privilege
1.4.2 Penetration testing vs. Vulnerability scanning
1.4.3 Black box vs. Gray box vs. White box
1.5 Explain vulnerability scanning concepts
1.5.1 Identifying
1.5.1.1 Vulnerability / Unpatched system or application
1.5.1.2 Lack of security controls
1.5.1.3 common misconfigurations
1.5.2 Intrusive vs. non-intrusive
1.5.3 Credentialed vs. non-credentialed
1.6 Explain the impact associated with types of vulnerabilities
1.6.1 Configuration issues
1.6.2 Access control
1.6.3 Cryptography, certificate and key management
1.6.4 Application vulnerabilities
1.6.5 Application input handling
Domain 2.0 Technologies and Tools
2.1 Install and configure network components, both hardware and software-based, to support
organizational security
2.1.1 Network equipment: Router, Switch, Bridge, Load Balancer, Proxy
2.1.2 Gateways: Email, Media
2.1.3 Access Points
2.1.4 Firewall
2.1.5 NAC
2.1.6 VPN / SSL/TLS accelerators & decryptors
2.1.7 NIPS/ NIDS
2.1.8 DLP
2.1.9 SIEM
2.2 Given a scenario, use appropriate software tools to assess the security posture of an organization
2.2.1 Network scanners
2.2.2 Protocol analyzer
2.2.3 Wireless scanners / crackers
2.2.4 Exploitation frameworks
2.2.5 Passive vs Active
2.2.6 Scanners: Vulnerability, Configuration compliance and inventory
2.2.7 Password crackers
2.2.8 Backup Utilities
2.2.9 Honeypot / Honeynet
2.2.10 Steganography
2.2.11 Command line tools: Unix/Linux and Windows
2.3 Given a scenario, troubleshoot common security issues
2.3.1 Personnel
2.3.2 Asset Management / Misconfigured devices
2.3.3 Identity, Access, Authentication, Authorization and Audit (IAAAA)
2.3.4 Encryption
2.4 Given a scenario, analyze and interpret output from security technologies
2.4.1 Network security technologies
2.4.2 Host security technologies
2.4.3 Data security technologies
2.5 Given a scenario, deploy mobile devices securely
2.5.1 Connection methods
2.5.2 Mobile device management concepts
2.5.3 Enforcement and monitoring
2.5.4 Deployment models
2.6 Given a scenario, implement secure protocols
2.6.1 Protocols
2.6.2 Use cases
Domain 3.0 Architecture and Design
3.1 Explain use cases and purpose for frameworks, best practices and secure configuration guides
3.1.1 Industry-standard frameworks and reference architectures
3.1.2 Benchmarks/secure configuration guides
3.1.3 Defense-in-depth/layered security
3.2 Given a scenario, implement secure network architecture concepts.
3.2.1 Zones/topologies
3.2.2 Segregation/segmentation/isolation
3.2.3 VPN / Tunneling
3.2.4 Security device/technology placement
3.2.5 Software Defined Networks (SDN)
3.3 Given a scenario, implement secure systems design
3.3.1 Hardware/firmware security
3.3.2 Operating System Security
3.3.3 Peripherals
3.4 Explain the importance of secure staging deployment concepts
3.4.1 Secure baseline
3.4.2 Sandboxing
3.4.3 Environment
3.4.4 Integrity measurement
3.5 Explain the security implications of embedded systems.
3.5.1 ICS / SCADA
3.5.2 IoT / Smart Devices
3.5.3 Printers / MFDs
3.5.4 Camera systems
3.5.5 Special purpose
3.6 Summarize secure application development and deployment concepts
3.6.1 Development life-cycle models
3.6.2 Secure DevOps / SecDevOps
3.6.3 Version control and change management
3.6.4 Provisioning and deprovisioning
3.6.5 Secure coding techniques
3.6.6 Code quality and testing
3.7 Summarize cloud and virtualization concepts
3.7.1 Hypervisor
3.7.2 Virtual Machine (VM)
3.7.3 Cloud computing
3.7.3.1 Deployment models
3.7.3.2 Storage
3.7.3.3 Access
3.8 Explain how resiliency and automation strategies reduce risk
3.8.1 Automation/scripting
3.8.2 Master image
3.8.3 Non-persistence
3.8.4 Forms and functions
3.9 Explain the importance of physical security controls
Domain 4.0 Identity and Access Management
4.1 Compare and contrast identity and access management concepts.
4.1.1 Identification, authentication, authorization and accounting (AAA)
4.1.2 Multifactor authentication
4.1.3 Single Sign-On (SSO) / Federation
4.2 Given a scenario, install and configure identity and access services
4.3 Given a scenario, implement identity and access management controls
4.3.1 Access Control Models
4.3.2 Physical Access Control
4.3.3 Biometrics
4.3.4 Tokens
4.3.5 Certificate-based authentication
4.3.6 Authorization: file-system and database
4.4 Given a scenario, differentiate common account management practices.
4.4.1 General concepts
4.4.2 Account types
4.4.3 Account policy enforcement
Domain 5.0 Risk Management
5.1 Explain the importance of policies, plans and procedures related to organizational security
5.1.1 Standard operating procedures
5.1.2 Agreement types
5.1.3 Personnel management
5.1.4 General security policies
5.2 Summarize business impact analysis concepts
5.3 Explain risk management processes and concepts
5.3.1 Threat assessment
5.3.2 Risk assessment
5.3.3 Change management
5.4 Given a scenario, follow incident response procedures
5.4.1 Incident response plan
5.4.2 Incident response process
5.5 Summarize basic concepts of forensics
5.5.1 Data acquisition
5.5.2 Preservation / Order of volatility
5.5.3 Chain of custody
5.5.4 Legal hold
5.5.5 Recovery
5.6 Explain disaster recovery and continuity of operations concepts
5.6.1 Backup concepts
5.6.2 Geographic considerations
5.6.3 Continuity of operations planning
5.6.4 Recovery sites
5.6.5 Order of restoration
5.7 Compare and contrast various types of controls
5.7.1 Administrative
5.7.2 Technical
5.7.3 Physical
5.7.4 Corrective
5.7.5 Preventive
5.7.6 Detective
5.7.7 Deterrent
5.7.8 Compensating
5.8 Given a scenario, carry out data security and privacy practices
5.8.1 Data sensitivity labeling and handling
5.8.2 Data roles
5.8.3 Data destruction and media sanitization
5.8.4 Legal and compliance
Domain 6.0 Cryptography and PKI
6.1 Compare and contrast basic concepts of cryptography
6.1.1 Symmetric algorithms
6.1.2 Asymmetric algorithms
6.1.3 Hashing
6.1.4 Keys and key exchange
6.1.5 Digital signatures
6.1.6 Common use cases
6.2 Explain cryptography algorithms and their basic characteristics
6.2.1 Symmetric algorithms
6.2.2 Cipher modes
6.2.3 Asymmetric algorithms
6.2.4 Hashing algorithms
6.3 Given a scenario, install and configure wireless security settings
6.3.1 Cryptographic protocols
6.3.2 Authentication protocols
6.3.3 Methods
6.4 Given a scenario, implement public key infrastructure
6.4.1 Components
6.4.2 Concepts
6.4.3 Types of certificates
6.4.4 Certificate formats
Total Cyber Certified Ethical Hacker Course Syllabus
The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v11 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.”
Course Outline:
Module 01: Introduction to Ethical Hacking |
Module 02: Footprinting and Reconnaissance |
Module 03: Scanning Networks |
Module 04: Enumeration |
Module 05: Vulnerability Analysis |
Module 06: System Hacking |
Module 07: Malware Threats |
Module 08: Sniffing |
Module 09: Social Engineering |
Module 10: Denial-of-Service |
Module 11: Session Hijacking |
Module 12: Evading IDS, Firewalls, and Honeypots |
Module 13: Hacking Web Servers |
Module 14: Hacking Web Applications |
Module 15: SQL Injection |
Module 16: Hacking Wireless Networks |
Module 17: Hacking Mobile Platforms |
Module 18: IoT Hacking |
Module 19: Cloud Computing |
Module 20: Cryptography |
Total Cyber Certified Network Defender Course Syllabus
Learn the skills that matter! EC-Council’s vendor-neutral network security certifications provide an unbiased approach to learning secure networking practices, as well as how to analyze and harden computing systems prevalent in the current IT infrastructure.
CND v2 has earned a reputation as the only program in the market that is 100% focused on network security and defense.
IT professionals need to be part of the cybersecurity ecosystem, especially in a post-COVID Digital Transformation era. If you think cybersecurity is the responsibility of cyber teams alone, think again!
Certified Network Defender v2 has been designed by industry experts to help IT Professionals play an active role in the Protection of digital business assets and Detection and Response to Cyber Threats, while leveraging Threat Intelligence to Predict them before they happen. CND is a network security course designed to help organizations create and deploy the most comprehensive network defense system.
Course Outline:
Module 01: Network Attacks and Defense Strategies |
Module 02: Administrative Network Security |
Module 03: Technical Network Security |
Module 04: Network Perimeter Security |
Module 05: Endpoint Security-Windows Systems |
Module 06: Endpoint Security-Linux Systems |
Module 07: Endpoint Security- Mobile Devices |
Module 08: Endpoint Security-IoT Devices |
Module 09: Administrative Application Security |
Module 10: Data Security |
Module 11: Enterprise Virtual Network Security |
Module 12: Enterprise Cloud Network Security |
Module 13: Enterprise Wireless Network Security |
Module 14: Network Traffic Monitoring and Analysis |
Module 15: Network Logs Monitoring and Analysis |
Module 16: Incident Response and Forensic Investigation |
Module 17: Business Continuity and Disaster Recovery |
Module 18: Risk Anticipation with Risk Management |
Module 19: Threat Assessment with Attack Surface Analysis |
Module 20: Threat Prediction with Cyber Threat Intelligence |
Total Cyber Desktop Support Program
Fundamentals of Information Technology
- IT Concepts and Terminology
- Infrastructure Setup
- Applications & Software
- Software Development
- Database Fundamentals
- Security Essentials
Fundamentals and intermediate skills of Software and Hardware support
- Hardware
- Operating Systems
- Software Troubleshooting
- Networking
- Hardware & Network Troubleshooting
- Security
- Mobile Devices
- Virtualization & Cloud Computing
- Operational Procedures
End User Awareness
- Information Protection
- Cyber Terrorism
- Social Engineering
- Remote Worker Security
- Virus Protection
- Password Security
- Web Browser Security
- Email Security
- Instant Messaging Security
- Telephone Security
- Mobile Security
Intermediate Network Concepts
- Networking Concepts
- Infrastructure
- Network Operations
- Network Security
- Network Troubleshooting & Tools
Intermediate Security Concepts
- Attacks, Threats and Vulnerabilities
- Architecture and Design
- Implementation
- Operations and Incident Response
- Governance, Risk and Compliance
Total Cyber Cybersecurity Engineer Program
Fundamentals of Information Technology
- IT Concepts and Terminology
- Infrastructure Setup
- Applications & Software
- Software Development
- Database Fundamentals
- Security Essentials
Intermediate Network Concepts
- Networking Concepts
- Infrastructure
- Network Operations
- Network Security
- Network Troubleshooting & Tools
Intermediate Security Concepts
- Attacks, Threats and Vulnerabilities
- Architecture and Design
- Implementation
- Operations and Incident Response
- Governance, Risk and Compliance
Cloud Computing
- Cloud Architecture & Design
- Cloud Security
- Cloud Deployment
- Operations & Support
- Troubleshooting
Operating System and Server and Workstation Concepts
- Vulnerability Assessment and Risk Management
- Students will learn how to address issues including:
- Vulnerability Assessment Frameworks
- Vulnerability Assessment Techniques
- Vulnerability Assessment Tools
- Detect and Respond to Vulnerabilities
- Preform a Vulnerability Assessment
Cyber Policy and Compliance
- Risk Assessment Fundamentals
- Steps to Risk Assessment Process
- Risk Assessment Procedures
- Risk Reduction and Management
Critical Controls
Security and Network Operations Center Concepts
- Fundamentals of Security and Network Operations Center
- Incident Detection and Response
- Security Event and Information Management (SEIM) or
- Security information and event management (SIEM)
- SEIM Deployment and Operations
Total Cyber Penetration Tester Program
Intermediate Network Concepts
- Networking Concepts
- Infrastructure
- Network Operations
- Network Security
- Network Troubleshooting & Tools
Intermediate Security Concepts
- Attacks, Threats and Vulnerabilities
- Architecture and Design
- Implementation
- Operations and Incident Response
- Governance, Risk and Compliance
Vulnerability Assessment
- Vulnerability Assessment Frameworks
- Vulnerability Assessment Techniques
- Vulnerability Assessment Tools
- Detect and Respond to Vulnerabilities
- Preform a Vulnerability Assessment
Fundamentals of Ethical Hacking and Penetration Testing
- Emerging Attack Vectors
- Enumeration
- Malware and Reverse Engineering
- Cloud Computing
- Hacking Web Applications
- Operation Technologies
- WIFI Cracking
- Penetration testing Labs
Intermediate Ethical Hacking and Penetration Testing
- Planning & Scoping
- Information Gathering & Vulnerability Identification
- Attacks & Exploits
- Penetration Testing Tools
- Reporting & Communication
- Ethical Hacking Labs
Advanced Ethical Hacking and Penetration Testing
- Penetration Testing: What You Should Know
- Getting Comfortable with Kali Linux
- Command Line Fun
- Practical Tools
- Bash Scripting
- Passive Information Gathering
- Active Information Gathering
- Vulnerability Scanning
- Web Application Attacks
- Introduction to Buffer Overflows
- Windows Buffer Overflows
- Linux Buffer Overflows
- Client-Side Attacks
- Locating Public Exploits
- Fixing Exploits
- File Transfers
- Antivirus Evasion
- Privilege Escalation
- Password Attacks
- Port Redirection and Tunneling
- Active Directory Attacks
- The Metasploit Framework
- PowerShell Empire
- Penetration Testing Labs
Total Cyber Python Fundamentals
Students will learn how to address issues including:
- Installing the latest version of Python
- Working with Jupyter Notebooks
- Python data types, operators, and variable names
- Python strings, lists, ranges, and constructors
- Controlling the flow of Python programs
- Modularizing code with functions
- Handling data with tuples, sets, and dictionaries
- Developing Python modules
- Encapsulation with Python classes
- Building an intelligent Texas Hold’em Poker application
Data Analysis
Students will learn how to address issues including:
- Introduction to pandas
- Selecting subsets of data
- Essential pandas commands
- Grouping data with pandas
- Analyzing time series data
- Exploring text with regular expressions
- Cleaning and transforming data
- Joining multiple datasets together
- Building professional data analytics reports
SQL
Students will learn how to address issues including:
- Connecting to SQL databases
- Querying databases with the SELECT statement
- Translating pandas to SQL
Data visualization
Students will learn how to address issues including:
- Learning the data visualization landscape in Python
- Building interactive data analytics dashboards