Zirlen Cybersecurity

Zirlen Technologies - Cybersecurity Course (30 Hours)

This Cyber Security training course builds a strong foundation in protecting systems, networks, and data from digital threats.
It covers core security concepts, threat analysis, risk management, and defensive techniques. Hands-on labs and real-world scenarios ensure practical, job-ready skills.
The course prepares learners to identify, prevent, and respond confidently to modern cyber-attacks.

Course Goal

Course Objectives

  • Core cybersecurity concepts
  • Common attacks & defences
  • Basic ethical hacking skills
  • Security tools used in the industry

Topics

  • What is cybersecurity?
  • Types of cyber threats (malware, phishing, ransomware)
  • CIA Triad (Confidentiality, Integrity, Availability)
  • Cybersecurity domains (network, application, cloud)

Hands-on

  • Identify phishing emails
  • Analyze real-world cyberattack case studies

Outcome

Understand why cybersecurity matters and key concepts.

Topics

  • OSI & TCP/IP models
  • IP addressing, DNS, HTTP/HTTPS
  • Firewalls, routers, switches

Hands-on

  • Use Wireshark to inspect packets
  • Check IP info using ipconfig / ifconfig

Outcome

Understand how networks work (essential for security).

Topics

  • Windows vs Linux security
  • User roles & permissions
  • File systems and access control

Hands-on

  • Basic Linux commands
  • Manage users and permissions

Outcome

Learn how systems are secured at OS level.

Topics

  • Malware types (virus, worm, trojan)
  • Social engineering
  • Vulnerabilities & CVE database

Hands-on

  • Explore vulnerability databases
  • Simulate phishing scenarios

Outcome

Identify threats and weaknesses in systems.

Topics

  • Encryption vs hashing
  • Symmetric vs asymmetric encryption
  • SSL/TLS basics

Hands-on

  • Use hashing tools (MD5, SHA)
  • Encrypt/decrypt simple data

Outcome

Understand how data is protected.

Topics

  • Phases of ethical hacking
  • Foot printing & reconnaissance
  • Scanning & enumeration

Tools

  • Nmap
  • Whois
  • Netcat

Hands-on

  • Scan a local network
  • Perform basic reconnaissance

Outcome

Learn how hackers think (legally & ethically).

Topics

  • OWASP Top 10
  • SQL Injection
  • Cross-Site Scripting (XSS)

Hands-on

  • Practice on DVWA (Damn Vulnerable Web App)

Outcome

Understand common web attacks.

Topics

  • IDS/IPS basics
  • SIEM overview
  • Log analysis

Tools

  • Splunk (basic)
  • Snort

Hands-on

  • Analyze logs for suspicious activity

Outcome

Learn how organizations monitor threats.

Topics

  • Incident response lifecycle
  • Risk assessment basics
  • Security policies

Hands-on

  • Create a simple incident response plan

Outcome

Know how to react to cyber incidents.

Project Options

  • Perform a vulnerability scan on a test system
  • Secure a small network setup
  • Analyze a simulated attack

Outcome

Apply everything learned in a practical scenario.

Recommended Tools

  • Kali Linux
  • Wireshark
  • Nmap
  • Burp Suite (Community)
  • Metasploit (basic exposure)

Time Breakdown

Module Hours
Intro 3
Networking 4
OS Security 3
Threats 4
Cryptography 3
Ethical Hacking 5
Web Security 3
Tools 3
Incident Response 2
Project 2
Total 30 hrs

Who This Course Is For

  • Beginners in cybersecurity
  • IT / CS students
  • Anyone interested in ethical hacking