Cybersecurity Certification Course

Secure enrollment now

Syllabus

Security Essentials

 

•    Need of Cyber Security
•    CIA Triad
•    Vulnerability, Threat and Risk
•    Risk Governance & Risk Management
•    Security Architecture
•    Security Governance
•    Security Auditing
•    Compliance
•    Computer Security Architecture & Design

 

Cryptography

 

•    Background of Cryptography
•    Symmetric Cryptography
•    Data Encryption Standard (DES)
•    Triple-DES
•    The Advanced Encryption Standard (AES)
•    International Data Encryption Algorithm (IDEA)
•    Blowfish
•    RC4
•    RC5
•    RC6
•    Asymmetric Cryptography
•    The Diffie-Hellman Algorithm
•    RSA
•    Elliptic Curve Cryptosystems (ECC)
•    Cryptographic Hash Functions
•    Attacks against Encrypted Data
•    Digital Certificates and its Format (X.509, X.500)
•    Certificate Authority, Certificate Repository,  Certificate  Revocation lists
•    Digital Certificate life cycle (Initialize, Issue, Cancel)
      

Computer Networks & Security


•    Network architecture, protocols, and technologies:

Layered architecture, Open Systems Interconnect (OSI) Model
•    Transmission Control Protocol/Internet Protocol (TCP/IP)
•    Hybrid TCP/IP Model
•    Application Layer Protocols: HTTP, SNMP, DNS, POP, SMTP
•    Transport layer protocols: Transmission Control Protocol (TCP), User Datagram Protocol (UDP)
•    Network/Internet layer protocols: Internet Protocol (IP) v4, IPv6,  IPsec protocols
•    Link layer protocols: Address Resolution Protocol (ARP) / Reverse ARP / Proxy ARP, Ethernet, VLAN

 

Application Security

 

•    Importance of Application Security
•    OWASP Top 10 web application vulnerabilities
•    SSDLC (Secure Software Development Life Cycle)

 

Data & Endpoint Security

 

•    Data Security
•    Data Security Controls
•    Endpoint Security
•    Host/ Endpoint Security Controls

 

IdAM (Identity & Access Management)

 

•    Authorization
•    Authentication
•    Access Control
•    Privilege levels
•    IAM life cycle
•    Identity & Access Management Process and activities


Cloud Security

 

•    Cloud Computing Architectural Framework
•    Concerns & Best Practices
•    Governance and Enterprise Risk Management
•    Legal Issues: Contracts and Electronic Discovery
•    Compliance and Audit Management
•    Information Management and Data Security
•    Interoperability and Portability
•    Traditional Security, Business Continuity, and Disaster


Recovery

 

•    Data Centre Operations
•    Incident Response
•    Application Security
•    Encryption and Key Management
•    Identity, Entitlement, and Access Management
•    Virtualization
•    Security as a Service

 

Phases of a Cyber Attack

 

Phase 1 —Reconnaissance: Adversary identifies and selects a target

Phase 2 —Weaponize: Adversary packages an exploit into a payload designed to execute on the targeted computer/network

Phase 3 —Deliver: Adversary delivers the payload to the target system

Phase 4 —Exploit: Adversary code is executed on the target system

Phase 5 —Install: Adversary installs remote access software that provides a persistent presence within the targeted environment or system

Phase 6 —Command and Control: Adversary employs remote access mechanisms to establish a command and control channel with the compromised device

Phase 7 —Act on Objectives: Adversary pursues intended objectives

 

Security Processes in practice for Businesses

 

•    Key Security Business Processes
•    Corp. & Security Governance
•    IT Strategy management
•    Portfolio/Program/Project management
•    Change management
•    Supplier (third party) management
•    Problem management
•    Knowledge management
•    Info-sec management
•    BCP
•    IT Operations management
•    Overview of top 20 security controls

Complimentary sessions on communication presentation and leadership skills.

Benefits from the course

Mode of Teaching

Live Interactive

  • Cyber security Certification Course will help you in learning about the basic concepts of Cyber security along with the methodologies that must be practised ensuring information security of an organization.

  • Starting from the Ground level Security Essentials, this course will lead you through Cryptography, Computer Networks & Security, Application Security, Data & Endpoint Security, idAM (Identity & Access Management), Cloud Security, Cyber-Attacks and various security practices for businesses.

  • Due to the severe shortage of skilled workers, cyber security professionals are among the most highly compensated in the technology sector, with a high premium over IT jobs in general.

  • Cyber security Career Options Growing Faster Than Other Sectors

 

Prerequisite:

  • There are no prerequisites  for  Cyber security certification course.

  • Basic knowledge of networking and cloud will be beneficial.

Prerequisites

  • There are no prerequisites for Cyber security certification course.
  • Basic knowledge of networking and cloud will be beneficial

Course Duration:

24 Hours

Class Hours:

2 Hours Day time slots or 3 Hours week end Slots (May change)

Video Clip

Address

 

Kerala State Rutronix

C-11, Padmasree,

Elankom Gardens
Vellayambalam,

Sasthamangalam P.O 
Thiruvananthapuram - 695010

Kerala, India

e-mail: md@keralastaterutronix.com

        

                         @2020 |  All Rights Reserved  | Designed and developed by ToySmiths - 🅜🅐 | Bizleaf