


Cybersecurity Certification Course
Secure enrollment now
Syllabus
Security Essentials
• Need of Cyber Security
• CIA Triad
• Vulnerability, Threat and Risk
• Risk Governance & Risk Management
• Security Architecture
• Security Governance
• Security Auditing
• Compliance
• Computer Security Architecture & Design
Cryptography
• Background of Cryptography
• Symmetric Cryptography
• Data Encryption Standard (DES)
• Triple-DES
• The Advanced Encryption Standard (AES)
• International Data Encryption Algorithm (IDEA)
• Blowfish
• RC4
• RC5
• RC6
• Asymmetric Cryptography
• The Diffie-Hellman Algorithm
• RSA
• Elliptic Curve Cryptosystems (ECC)
• Cryptographic Hash Functions
• Attacks against Encrypted Data
• Digital Certificates and its Format (X.509, X.500)
• Certificate Authority, Certificate Repository, Certificate Revocation lists
• Digital Certificate life cycle (Initialize, Issue, Cancel)
Computer Networks & Security
• Network architecture, protocols, and technologies:
Layered architecture, Open Systems Interconnect (OSI) Model
• Transmission Control Protocol/Internet Protocol (TCP/IP)
• Hybrid TCP/IP Model
• Application Layer Protocols: HTTP, SNMP, DNS, POP, SMTP
• Transport layer protocols: Transmission Control Protocol (TCP), User Datagram Protocol (UDP)
• Network/Internet layer protocols: Internet Protocol (IP) v4, IPv6, IPsec protocols
• Link layer protocols: Address Resolution Protocol (ARP) / Reverse ARP / Proxy ARP, Ethernet, VLAN
Application Security
• Importance of Application Security
• OWASP Top 10 web application vulnerabilities
• SSDLC (Secure Software Development Life Cycle)
Data & Endpoint Security
• Data Security
• Data Security Controls
• Endpoint Security
• Host/ Endpoint Security Controls
IdAM (Identity & Access Management)
• Authorization
• Authentication
• Access Control
• Privilege levels
• IAM life cycle
• Identity & Access Management Process and activities
Cloud Security
• Cloud Computing Architectural Framework
• Concerns & Best Practices
• Governance and Enterprise Risk Management
• Legal Issues: Contracts and Electronic Discovery
• Compliance and Audit Management
• Information Management and Data Security
• Interoperability and Portability
• Traditional Security, Business Continuity, and Disaster
Recovery
• Data Centre Operations
• Incident Response
• Application Security
• Encryption and Key Management
• Identity, Entitlement, and Access Management
• Virtualization
• Security as a Service
Phases of a Cyber Attack
Phase 1 —Reconnaissance: Adversary identifies and selects a target
Phase 2 —Weaponize: Adversary packages an exploit into a payload designed to execute on the targeted computer/network
Phase 3 —Deliver: Adversary delivers the payload to the target system
Phase 4 —Exploit: Adversary code is executed on the target system
Phase 5 —Install: Adversary installs remote access software that provides a persistent presence within the targeted environment or system
Phase 6 —Command and Control: Adversary employs remote access mechanisms to establish a command and control channel with the compromised device
Phase 7 —Act on Objectives: Adversary pursues intended objectives
Security Processes in practice for Businesses
• Key Security Business Processes
• Corp. & Security Governance
• IT Strategy management
• Portfolio/Program/Project management
• Change management
• Supplier (third party) management
• Problem management
• Knowledge management
• Info-sec management
• BCP
• IT Operations management
• Overview of top 20 security controls
Complimentary sessions on communication presentation and leadership skills.
Benefits from the course
Mode of Teaching
Live Interactive
Cyber security Certification Course will help you in learning about the basic concepts of Cyber security along with the methodologies that must be practised ensuring information security of an organization.
Starting from the Ground level Security Essentials, this course will lead you through Cryptography, Computer Networks & Security, Application Security, Data & Endpoint Security, idAM (Identity & Access Management), Cloud Security, Cyber-Attacks and various security practices for businesses.
Due to the severe shortage of skilled workers, cyber security professionals are among the most highly compensated in the technology sector, with a high premium over IT jobs in general.
Cyber security Career Options Growing Faster Than Other Sectors
Prerequisite:
There are no prerequisites for Cyber security certification course.
Basic knowledge of networking and cloud will be beneficial.
Prerequisites
- There are no prerequisites for Cyber security certification course.
- Basic knowledge of networking and cloud will be beneficial
Course Duration:
24 Hours
Class Hours:
2 Hours Day time slots or 3 Hours week end Slots (May change)