MemoLearning Cybersecurity Track

Protect digital systems and data through hands-on training in security fundamentals, networks, ethical hacking, and more.

← Back to Homepage

Introduction to Cybersecurity

Foundational principles, history, and security mindset.

Networking Basics

TCP/IP, protocols, DNS, IP addressing, and OSI model.

Operating System Security

Hardening Windows, Linux, and endpoint protection.

Threats and Vulnerabilities

Common attack vectors and malware types.

Network Security

Firewalls, IDS/IPS, VPNs, proxies, and wireless protection.

Cryptography

Encryption, hashing, digital signatures, and key management.

Identity & Access Management (IAM)

Authentication, authorization, and access controls.

Ethical Hacking

Penetration testing, Kali Linux, Metasploit, and techniques.

Web Application Security

OWASP Top 10, SQL injection, XSS, and CSRF protection.

Incident Response & Forensics

Responding to breaches and investigating digital evidence.

Security Operations (SOC)

Monitoring, SIEM tools, and threat intelligence.

Cloud Security

Securing AWS, Azure, GCP, and shared responsibility model.

Risk Management & Compliance

Frameworks (NIST, ISO), risk assessment, and governance.

Security Automation

Scripting with Python and tools for automated detection.

Red Team vs Blue Team

Simulated attacks and real-time defense strategies.