Cyber Security Bootcamp
-
Byadmin
Get unlimited access to all learning content and premium assets Membership Pro
Cyber Security Bootcamp: Johannesburg Course Guide
Johannesburg is not only a city brimming with innovation, but it is also grappling with a growing demand for cybersecurity experts. The more businesses and individuals depend on digital systems, the greater the need becomes for professionals who can protect data and infrastructure. We at Code Street Academy have witnessed this firsthand. That is why we developed our thorough cybersecurity bootcamp. It is designed to provide people with the skills they need to flourish in this crucial field.
The Rationale Behind a Cybersecurity Bootcamp in Johannesburg
Johannesburg strikes us as an ideal location for a cyber security bootcamp. The city has a lively economy and expanding tech sector. That means there is a continuous need for skilled pros who can protect sensitive information. A traditional cyber security course can give you a solid base. However, a bootcamp provides a quicker, hands on method that prepares you for a job at a faster pace.
Consider this: You could dedicate years to learning the theory of driving. Or, you could get behind the wheel of a car with an experienced instructor and learn by doing. Our cybersecurity bootcamp acts as that driving instructor. It guides you through actual scenarios and equips you with useful skills that you can put to use immediately.
The Curriculum of Our Cyber Security Bootcamp
Our curriculum aims to encompass the core skills and knowledge that cyber security professionals require. We go beyond teaching you about threats. We teach you how to defend against them. Here is a glimpse of what you will learn:
- Network Security:Â Comprehending network protocols, firewalls and intrusion detection systems.
- Ethical Hacking:Â Learning to think like a hacker to spot vulnerabilities and weaknesses in systems.
- Cryptography:Â Mastering encryption and decryption techniques to safeguard sensitive data.
- Incident Response:Â Devising strategies to respond to and recover from cyberattacks.
- Security Auditing: Evaluating an organization’s security posture and suggesting improvements.
From Bootcamp to Boardroom: Career Trajectories in Cyber Security
The need for cyber security professionals is growing at an exponential rate. This is spawning a wide array of career prospects. Graduates of our cyber security bootcamp have transitioned to positions such as:
- Security Analyst
- Penetration Tester
- Security Engineer
- Incident Responder
- Security Consultant
The Code Street Academy Differentiator
What makes our cyber security bootcamp stand out? We are dedicated to providing practical, relevant and career focused education. We realize that you are investing your time and money in this program. We are dedicated to assisting you in reaching your objectives.
Here are some important advantages of selecting Code Street Academy:
- Experienced Instructors:Â Our instructors are veterans of the industry. They possess years of cyber security experience. They are passionate about teaching and dedicated to helping you thrive.
- Hands On Learning:Â We are of the opinion that the optimal method to learn cyber security is through doing. Our bootcamp is packed with labs, simulations and real world case studies. These will equip you with the practical skills you need.
- Career Support:Â We supply thorough career support. This includes resume workshops, interview coaching and job placement assistance. We are committed to helping you secure your dream job in cyber security.
- 28 Sections
- 189 Lessons
- 20 Weeks
- Cybersecurity Fundamentals14
- 1.1Cybersecurity Fundamentals Learning objectives
- 1.2Describing the CIA Triad
- 1.3Comparing Security Deployments Network, Endpoint, and Application Security Systems
- 1.4Comparing Security Deployments Agentless and Agent-based Protections
- 1.5Comparing Security Deployments Legacy Antivirus and Antimalware
- 1.6Comparing Security Deployments SIEM, SOAR, and Log Management
- 1.7Defining Threat Intelligence
- 1.8Defining Threat Hunting
- 1.9Understanding Malware Analysis
- 1.10Interpreting the Output Report of a Malware Analysis Tool
- 1.11Understanding the Different Threat Actor Types
- 1.12Defining Run Book Automation (RBA)
- 1.13Defining Reverse Engineering
- 1.14Understanding the Sliding Window Anomaly Detection
- Cybersecurity Principles13
- 2.1Learning objectives Additional cyber security principles
- 2.2Performing Risk Assessment
- 2.3Comparing Threats, Vulnerabilities, and Exploits
- 2.4Understanding Authentication, Authorization, and Accounting
- 2.5Examining the Access Control Process Terminology and Data Classification
- 2.6Examining the Access Control Process Data States and Policy Roles
- 2.7Examining the Access Control Process Security and Access Control Classification
- 2.8Understanding Discretionary Access Control
- 2.9Understanding Mandatory Access Control
- 2.10Understanding Role-based Access Control
- 2.11Understanding Attribute-based Access Control
- 2.12Understanding Rule-based Access Control
- 2.13Understanding Time-based Access Control
- Types of Attacks and Vulnerabilities0
- Fundamentals of Cryptography and PKI0
- Fundamentals of Incident Response0
- Fundamentals of Security Monitoring0
- Intrusion Event Categories0
- Digital Forensics Fundamentals0
- Endpoint Security Technologies and Host-based Forensics Fundamentals0
- Network Intrusion Analysis8
- 10.1Learning objectives Network Intrusion Analysis
- 10.2Introducing Intrusion Analysis Fundamentals
- 10.3Examining Packet Captures
- 10.4Examining Protocol Headers
- 10.5Analyzing Security Device Data
- 10.6Differentiating False Positives, False Negatives, True Positives, and True Negatives
- 10.7Comparing Inline Traffic Interrogation and Taps or Traffic Monitoring
- 10.8Extracting Files from a TCP Stream when Given a PCAP File and Wireshark
- Introducing AAA and Identity Management9
- 11.1Learning objectives AAA and Identity Management
- 11.2Understanding Authentication
- 11.3Exploring the RADIUS Protocol
- 11.4Surveying the TACACS+ Protocol
- 11.5Understanding Authorization
- 11.6Surveying Authorization Models
- 11.7Defining Accounting
- 11.8Exploring Multifactor Authentication and Single Sign-On
- 11.9Exploring Examples of Multifactor and Single Sign-On
- Network Visibility and Segmentation8
- 12.1Learning objectives Network Visibility
- 12.2Defining Network Visibility and Segmentation
- 12.3Introducing NetFlow and IPFIX
- 12.4Describing Flexible NetFlow Records
- 12.5Understanding NetFlow Deployment
- 12.6Introducing Network Segmentation
- 12.7Exploring Application-based Segmentation
- 12.8Describing Network Access with CoA
- Network Infrastructure Security12
- 13.1Learning objectives Network Infrastructure Security
- 13.2Configuring and Verifying Network Segmentation Using VLANs and VRF-lite
- 13.3Configuring and Verifying Port Security
- 13.4Configuring and Verifying DHCP Snooping
- 13.5Configuring and Verifying Dynamic ARP Inspection
- 13.6Exploring and Mitigating Common Layer 2 Threats
- 13.7Understanding and Configuring BPDU Guard and Root Guard
- 13.8Understanding and Configuring CDPLLDP
- 13.9Understanding the Control Plane, Data Plane, and Management Plane
- 13.10Exploring How to Secure the Management Plane
- 13.11Exploring How to Secure the Control Plane
- 13.12Exploring How to Secure the Data Plane
- Software-Defined Networking Security and Programmability16
- 14.1Learning objectives SDN
- 14.2Introducing SDN
- 14.3Explaining North Bound and South Bound APIs in the SDN Architecture
- 14.4Introducing Cisco ACI
- 14.5Introducing Cisco DNA and Cisco DNA Center
- 14.6Understanding VXLAN and Network Overlays
- 14.7Understanding Microsegmentation
- 14.8Surveying Open Source SDN Solutions
- 14.9Understanding the Threats Against SDN Solutions
- 14.10Understanding the Security Benefits in SDN Solutions
- 14.11Introducing Network Programmability
- 14.12Exploring DevNet and DevNet Resources for Security Automation
- 14.13Introducing APIs, NETCONF, RESTCONF, and YANG
- 14.14A Brief Introduction to Git
- 14.15Exploring pxGrid
- 14.16Integrating and Automating Security Operations with Cisco Products
- Overview of Ethical Hacking and Penetration Testing7
- 15.1Learning objectives Ethical Hacking
- 15.2Introducing Ethical Hacking and Pen Testing
- 15.3Exploring Penetration Testing Methodologies
- 15.4Explaining the Importance of the Planning and Preparation Phase
- 15.5Understanding the Legal Concepts of Penetration Testing
- 15.6Learning How to Scope a Penetration Testing Engagement Properly
- 15.7Learning the Key Aspects of Compliance-based Assessments
- Information Gathering and Passive Reconnaissance10
- 16.1Learning objectives Information Gathering
- 16.2Introducing Footprinting Concepts and Methodologies
- 16.3Performing Footprinting through Search Engines
- 16.4Performing Footprinting through Web Services
- 16.5Performing Footprinting through Social Networking Sites
- 16.6Understanding Website Footprinting
- 16.7Understanding DNS Footprinting
- 16.8Understanding Network Footprinting
- 16.9Performing Footprinting through Social Engineering
- 16.10Surveying Footprinting Tools
- Active Reconnaissance, Scanning, and Enumeration15
- 17.1Learning objectives Active Reconnaissance
- 17.2Surveying Network Scanning Concepts
- 17.3Exploiting Scanning Tools
- 17.4Understanding Host Discovery
- 17.5Understanding Port and Service Discovery
- 17.6Performing OS Discovery (Banner GrabbingOS Fingerprinting)
- 17.7Scanning Beyond IDS and Firewall
- 17.8Creating Network Diagrams
- 17.9Introducing Enumeration Techniques
- 17.10Performing NetBIOS Enumeration
- 17.11Performing SNMP Enumeration
- 17.12Performing LDAP Enumeration
- 17.13Performing NTP and NFS Enumeration
- 17.14Performing SMTP and DNS Enumeration
- 17.15Conducting Additional Enumeration Techniques
- Hacking Web Servers6
- Hacking Web Applications14
- 19.1Learning objectives Hacking Web Applications
- 19.2Introducing Web Application Concepts
- 19.3Understanding Web App Threats and Hacking Methodologies
- 19.4Footprinting Web Infrastructures
- 19.5Analyzing Web Applications
- 19.6Introducing the OWASP Top 10
- 19.7Attacking Authentication, Authorization, and Access Controls – Part 1
- 19.8Attacking Authentication, Authorization, and Access Controls – Part 2
- 19.9Performing Command Injection Attacks
- 19.10Exploiting DirectoryPath Traversal Vulnerabilities
- 19.11Input Validation and Sanitation
- 19.12Exploiting Cross-site Scripting (XSS) Vulnerabilities
- 19.13Exploiting XML External Entities
- 19.14Attacking Web Services, APIs, and Understanding Webhooks
- SQL Injection7
- Fundamentals of Wireless Hacking8
- Wireless Client Attacks6
- 22.1Learning objectives Wireless Client Attacks
- 22.2Understanding Wireless Client Attacks and Their Motives
- 22.3Learning Packet Injection Attacks
- 22.4Eavesdropping and Manipulating Unencrypted Wi-Fi Communications
- 22.5Attacking Publicly Secure Packet Forwarding (PSPF)
- 22.6Attacking the Preferred Network List (PNL)
- Building Your Lab and Attack Hardware4
- Aircrack-ng8
- Buffer Overflows8
- 25.1Learning objectives Buffer Overflows
- 25.2Understanding Buffer Overflows
- 25.3Exploiting Buffer Overflows
- 25.4Overcoming Defenses for Buffer Overflow Vulnerabilities
- 25.5Understanding Fuzzing
- 25.6Creating a Fuzzing Strategy
- 25.7Exploring Mutation-based, Generation-based, and Evolutionary Fuzzers
- 25.8Surveying Tools to Find and Exploit Buffer Overflows
- Post-Exploitation Techniques4
- Hacking User Credentials8
- 27.1Learning objectives Hacking User Credentials
- 27.2Understanding Authentication and Authorization Mechanisms
- 27.3Understanding Authentication and Authorization Attacks
- 27.4Exploring Password Storage Mechanisms
- 27.5Understanding Password Storage Vulnerability
- 27.6Cracking Passwords with John the Ripper
- 27.7Cracking Passwords with hashcat
- 27.8Improving Password Security
- Reporting and Communication4
Get unlimited access to all learning content and premium assets Membership Pro
You might be interested in
-
All levels
-
0 Students
-
347 Lessons
-
All levels
-
0 Students
-
267 Lessons
-
All levels
-
26 Students
-
0 Lessons
-
All levels
-
50 Students
-
0 Lessons
Sign up to receive our latest updates
Get in touch
Call us directly?
Address
- © 2025 Code Street Academy .All rights reserved.