1Cyber SecurityIs the practice of protecting computer systems, networks, mobile devices and data from unauthorized access, use, disclosure, disruption, modification or destruction by using various methods, processes, tools and behaviors. 
Key Types:Network SecurityProtecting computer networks from intruders. 
Application SecurityKeeping software and devices free from threats. 
Information SecurityProtecting the integrity and privacy of data.
Methods & Tools:FirewallsFiltering network data between a host or network and another network. 
Antivirus SoftwareProtecting against malware. 
Encryption TechniquesMaking data unreadable to unauthorized parties. 
Data Loss Prevention (DLP)Tools to detect and block attempted data theft. 
Identity and Access Management ProtocolsSafeguarding digital identities of individuals, devices, and organizations. 
Fact:Human ElementCybersecurity also relies on people’s awareness, following best practices and adhering to security protocols to prevent breaches.
2SANSSysAdmin, Audit, Network, SecurityIs an Institute & providing cybersecurity training and certification, offering courses and resources for professionals in various cybersecurity domains
3GIACGlobal Information Assurance Certificationa partner of SANS, develops and administers professional cybersecurity certifications that validate skills and knowledge gained from cyber security coursesGaining Knowledge through SANS course and passing the corresponding GIAC exam can lead to a GIAC certification. Certification validity is for 4 years or earn 36 CPEs (Continuing Professional Education) credits within the four-year validity period to remain certified. 
4Area of Specialization in Cyber Security:Cloud SecurityCloud Security Essentials
Cyber Defense / Open Source Intelligense (OSINT)(OSINT) research and investigations supporting law enforcement, intelligence operations and a variety of private sector businesses
Cyber Security & IT EssentialsNetwork, Endpoint & Cloud
Cyber Security Leadership
Digital Forensics, Incident Response & Threat Hunting
Industrial Control Systems SecurityICS/SCADA Security Essentials
Offensive Operations, Pen Testing & Red TeamingHacker Tools, Techniques and Incident Handling
5Course & CertificationLot of courses & certifcations are available of Duration:6 Days to 4 Months, Few listed below wrt its applicable certification like:SANS offer 85 courses in cyber security…
Focus AreaSANS CourseGIAC Certification
Offensive Operations, Pen Testing, and Red TeamingSEC504 – Hacker Tools, Techniques, and Incident HandlingGIAC Certified Incident Handler (GCIH)
SEC560 – Enterprise Penetration TestingGIAC Penetration Tester Certfication (GPEN)
SEC542 – Web App Penetration Testing and Ethical HackingGIAC Web App Penetration Tester Certfication (GWAPT)
SEC588 – Cloud Penetration TestingGIAC Cloud Penetration Tester Certfication (GCPN)
SEC575 – iOS and Android Application Security Analysis and Penetration TestingGIAC Mobile Device Security Analyst (GMOB)
SEC660 – Advanced Penetration Testing, Exploit Writing, and Ethical HackingGIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
SEC617 – Wireless Penetration Testing and Ethical HackingGIAC Assessing and Auditing Wireless Networks (GAWN)
SEC580 – Metasploit for Enterprise Penetration Testing
SEC556 – IoT Penetration Testing
SEC568 – Product Security Testing
SEC467 –  Social Engineering for Security Professionals
Cyber DefenceSEC503 – Network Monitoring and Threat Detection In-DepthGIAC Certified Intrusion Analyst (GCIA)
SEC450 – Blue Team Fundamentals: Security Operations and AnalysisGIAC security Operations Certified (GSOC)
Cyber Defense / Open Source Intelligense (OSINT)SEC497 –  Practical Open-Source Intelligence (OSINT)GIAC Open Source Intelligence Certification (GOSI)
SEC587 – Advanced Open-Source Intelligence (OSINT) Gathering and Analysis™
Cyber Security EssentialsSEC401 – Security Essentials – Network, Endpoint, and CloudGIAC SECURITY ESSENTIAL CERTIFICATION (GSEC)
Digital Forensics, Incident Response & Threat HuntingFOR508 – Advanced Incident Response, Threat Hunting, and Digital ForensicsGIAC Certified Forensic Analyst (GCFA)
FOR578 – Cyber Threat IntelligenceGIAC Cyber Threat Intelligence (GCTI)
FOR500 – Windows Forensic AnalysisGIAC Certified Forensic Examiner (GCFE)
FOR610 – Reverse-Engineering Malware: Malware Analysis Tools and TechniquesGIAC Reverse Engineering Malware (GREM)
FOR509 – Enterprise Cloud Forensics and Incident ResponseGIAC Cloud Forensics Responder (GCFR)
FOR589 – Cybercrime Intelligence
FOR585 – Smartphone Forensic Analysis In-DepthGIAC Advanced Smartphone Forensics (GASF)
FOR518 – Mac and iOS Forensic Analysis and Incident ResponseGIAC iOS and macOS Examiner (GIME)
6Defensive & Offensive Cyber Security ProfessionsDefensiveRelated to network scanners, analyser, application security tools, frameworks, incident response tools  
OffensiveRelated to ethical hacking tools
7Personnel RoleOffensive Operations:Red Team member
Pen Tester
Defensive Operations:Counterespionage Analyst
Cryptanalyst
Cyber Intelligence Specialist
Data Privacy Officer
Data Security Analyst
Industrial Internet of Things (IIoT) Security Specialist
Information Security Analyst
IT Security Architect
Security Operations Center (SOC) Analyst
Security Awareness Training Specialist
Supervisory control and data acquisition (SCADA) Security Analyst
Leadership:Chief Security Officer (CSO)
Chief Information Security Officer (CISO)
Security Operations Center (SOC) Manager
Incident Response and Threat Hunting:Threat Hunter
Virus Technician
Bug Bounty Hunter
Ethical Hacker
Incident Responder
Malware Analyst
Vulnerability Assessor
Threat Intel and Forensics:Cyber Insurance Policy Specialist
Cyber Operations Specialist
Cybercrime Investigator
Cybersecurity Lawyer
Source Code Auditor
Digital Forensic Expert do work like Preserve Data, do Hashing, work on Memory Analysis tool & on other forensic tools. These tools are with specific agencies like CERT – Centre Of Emergency Response Team (Govt Agency) AND password hacking tool provide by Cellebrite Software Company for latest version-1
8Additional KnowledgeRequired of:Python
Digital Forensic Tools
Intelligence Tools
Networking Tools
Windows OS
Kali Linux / Parret Security OS
Android & iOS
JS
PHP
OSINT Tools
Social Media Apps