Foundation Course in Cybersecurity

Course Description

The essential course for every security analyst & practitioner of Cyber Security.

This course is for

  • For Entry Level,
  • Oracle OpenJDK
  • Refresher education at all levels; and for
  • ITAM, FinOps & ITOM practitioners who need to have foundational knowledge in Cyber Security.

Begin your professional journey in cybersecurity with ITAM India's Foundations in Cyber Security program. This fast-track course is meticulously designed for individuals with no prior experience required, providing a robust foundation in essential cybersecurity principles.

The curriculum is structured to equip you with the fundamental knowledge necessary to confidently pursue the industry-recognized ITAM India certification. This program serves as an ideal entry point for aspiring professionals seeking a rewarding career in the dynamic field of cybersecurity.

The course teaches you how to secure devices and protect networks of all sizes, and manage both Linux and Windows systems.

Who Should Attend the course?

  • Entry Level Security Analysts
  • Everyone who wants to be a part of the IT Operations Management teams
  • ITAM, FinOps & ITOM practitioners who need to have foundational knowledge in Cyber Security.
  • Any IT Operations personnel who needs a refresher course with the latest in Cyber Security.

Certification

  • Certificate in Cyber Security Foundations Plus

Exam Details

  • Multiple Choice
  • 100 questions
  • 120 minutes
  • 85% passing marks

Curriculum

  • 6 Sections
  • 31 Lessons
  • 18.5 Hours

The total course can be conducted over 3 full days or 6 half-day sessions.

 

  • 4
    • 1.1
      Confidentiality, Integrity, and Availability (CIA Triad)
      • Definitions and real-world examples
      • Threats to each component
    • 1.2
      Security Governance
      • Security policies, standards, procedures, guidelines
      • Risk management and threat modeling basics
    • 1.3
      Defense-in-Depth Strategy
      • Layered security concept (physical, network, application, data)
      • Preventive, detective, corrective controls
    • 1.4
      Security Roles & Responsibilities
      • Security vs compliance vs audit
      • Roles: data owner, data custodian, user, security officer
  • 5
    • 1.1
      Business Continuity (BC) and Disaster Recovery (DR)
      • Purpose and scope
      • Business Impact Analysis (BIA)
    • 1.2
      Disaster Recovery Planning (DRP)
      • Types of disasters (natural, technical, human)
      • DR process and testing
    • 1.3
      Recovery Metrics
      • RTO (Recovery Time Objective) and
      • RPO (Recovery Point Objective)
    • 1.4
      Backup Strategies
      • Full, incremental, differential, snapshot backups
      • Off-site, cloud-based backups
    • 1.4
      Disaster Recovery Site Types
      • Hot, Warm, and Cold sites
      • Mobile DR units and cloud DR
  • 5
    • 1.1
      Identification, Authentication, Authorization, Accounting (IAAA)
    • 1.1
      Authentication Factors
      • Something you know/have/are/do/where you are
      • Examples of each (e.g., passwords, tokens, biometrics)
    • 1.1
      Multi-Factor Authentication (MFA)
      • Use cases and implementation
    • 1.1
      Access Control Models
      • RBAC (Role-Based Access Control)
      • DAC, MAC, ABAC
    • 1.1
      Provisioning and De-provisioning
      • Onboarding and offboarding procedures
      • Least privilege and need-to-know principles
  • 7
    • 1.1
      Basic Network Concepts
      • OSI Model basics
      • TCP/IP stack
    • 1.1
      Firewalls
      • Packet filtering, stateful, application proxy
    • 1.1
      Intrusion Detection and Prevention (IDS/IPS)
      • Signature-based vs anomaly-based
    • 1.1
      Virtual Private Networks (VPNs)
      • IPSec vs SSL VPNs
      • Encryption and tunnelling protocols
    • 1.1
      Secure Network Protocols
      • HTTPS, SSH, TLS, SFTP, DNSSEC
    • 1.1
      Wireless Security
      • WPA2/WPA3, 802.1X, rogue APs
    • 1.1
      Segmentation and Zoning
      • VLANs, DMZs, NAC
  • 5
    • 1.1
      Logging and Monitoring
      • SIEM basics
      • Event vs log vs alert
    • 1.1
      Incident Response (IR)
      • IR Lifecycle: Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned
      • Roles and responsibilities during an incident
    • 1.1
      Forensics Basics
      • Chain of custody, preservation of evidence
    • 1.1
      Escalation Procedures
      • Communication channels and incident severity levels
    • 1.1
      Security Awareness
      • User education, phishing simulations, reporting mechanisms
  • 5
    • 1.1
      Sample Questions
      • 30–50 realistic exam-style multiple-choice questions
      • Explanation of correct answers
    • 1.1
      Common Exam Traps
      • Misleading terms, distractors, and "best answer" questions
    • 1.1
      Key Takeaways from Each Domain
    • 1.1
      Exam Preparation Tips
      • Time management, stress reduction, how to approach difficult questions
    • 1.1
      Open Q&A Session
      • Review weak areas and learner queries

Schedule:
Day 1: 19th July 2025, 10am to 2pm
Day 2: 20th July 2025, 10am to 2pm
Day 3: 25th July 2025, 10am to 2pm
Day 4: 26th July 2025, 10am to 2pm
Day 5: 27th July 2025, 10am to 2pm

00
days
00
hours
00
minutes
00
seconds

Details

Topic: Foundation Course in Cybersecurity
Hosted By: Ritesh Verma
Start: Sat, Jul 19, 2025 10:00 AM
Category: Instructor Led Online, July 2025
Duration: 20 hours 0 minutes
Current Timezone: Asia/Kolkata

Note: Countdown time is shown based on your local timezone.