Foundations of Cybersecurity

BY
Skill Lync

Mode

Online

Duration

9 Weeks

Quick Facts

particular details
Medium of instructions English
Mode of learning Self study
Mode of Delivery Video and Text Based

Course and certificate fees

The fees for the course Foundations of Cybersecurity is -

HeadAmount
Programme feesRs. 40,000

 

certificate availability

Yes

certificate providing authority

Skill Lync

The syllabus

Week 1 - Introduction to Cybersecurity Hardware Basics

  • The basics of cybersecurity 
  • Importance of cybersecurity
  • Careers in cybersecurity 
  • Basic hardware and boot devices
  • Challenges on Enterprise Cyber Attack
  • Prerequisites for Cyber Security career
  • Power-On Self Test (POST)
  • Basic Input/Output System (BIOS)
  • Unified Extensible Firmware Interface (UEFI)
  • Network Interface Card (NIC)
  • Firmware
  • Virtualization
  • Redundant Array of Independent/Inexpensive Disks
  • (RAID)
  • Network Attached Storage (NAS)
  • Hard Disk Drives (HDD), Solid-State Drive (SSD),
  • Non-Volatile Memory express (NVMe)

Week 2 - Networking Basics

  • Router and its usage 
  • Firewall 
  • Private and Public Internet Protocol (IP)
  • Protocol 
  • Open Systems Interconnection (OSI) Layer 
  • Introduction to Networking
  • Router, Switch, Firewall, Wi-Fi 
  • Access Point vs Range Extender 
  • IPV4 / IPV6
  • Private and Public IP
  • MAC Address
  • Protocol
  • OSI Layer
  • Attack patterns based on OSI Layer

Week 3 - Networking

  • Intrusion Detection System (IDS), Intrusion Prevention System (IPS) 
  • Unicast, Broadcast, Multicast 
  • Automatic Private IP Adressing (APIPA) 
  • Transmission Control Protocol (TCP) 3 Way Handshake 
  • Address Resolution Protocol (ARP)/Reverse Address Resolution Protocol (RARP) 
  • Port Number and Well Known Ports 
  • Network Address Translation (NAT)/Value-Added Network (VAN)

Week 4 - Windows

  • Server types 
  • Workgroup Vs. Domain 
  • User Account Control Usage
  • What a server is and its function
  • Windows server roles and usage
  • Products used in windows server
  • Workgroup Vs Domain
  • User Account Control usage
  • Bitlocker functionality
  • Event Viewer usage
  • PowerShell in windows
  • Basic windows commands

Week 5 - Linux

  • Linux and its features
  • Linux Distros
  • Directory structure
  • File systems
  • Linux basic commands
  • Linux and its structure
  • The list of features in Linux
  • Linux distributions and its types
  • Linux directory and file structure
  • Linux basic commands
  • Networking based commands in linux
  • Kali linux and its features

Week 6 - Security Part 1

  • Types of hackers 
  • Sources of cybersecurity threats 
  • Types of malware and its classifications 
  • Difference between virus/spam and its working scenario 
  • Raise of spyware, adware, and keylogger 
  • Ransomware working and types 
  • Phishing, Denial of Service (DoS), and Distributed Denial of Service (DDoS) attacks

Week 7 - Security Part 2

  • Attack vectors based on web application 
  • URL structure and how URL manipulation works 
  • Cross-Site Scripting (XSS) and SQL (Structured Query Language) Injection 
  • What encryption is and how its related to Secure Sockers Layer (SSL)/Transport Layer Security (TLS) 
  • Comparing the usage of cryptography in daily use of applications 
  • HTTP request methods and detection of status code
  • Honey pot in cybersecurity 
  • Importance of Open Web Application Security Project (OWASP)
  • Top 10 most critical risks

Week 8 - Security Part 3

  • Cyber risk analysis 
  • Cyber security frameworks 
  • Blockchain and cloud computing 
  • Insight of darknet and how to defend yourself 
  • CIA and it’s usage
  • Difference between threat, vulnerability and risk
  • Cybersecurity frameworks and it’s efficiency in enterprise
  • How blockchain technology is used in cryptocurrency
  • Cloud computing and its types
  • How MFA works and its types
  • Dark web and how it’s used
  • Protecting yourself from cyber attacks

Week 9 - Security Operation Center (SOC) Teams

  • Team roles and responsibility
  • Working hierarchy
  • Multiple layers of Securing the infrastructure
  • Physical and cloud security
  • Introduction to SOC team
  • Network Security
  • Application Security
  • Cloud Security
  • Endpoint Security
  • Email Security
  • Vulnerability management
  • Penetration Testing
  • Identity Access Management (IAM)
  • Security Information and Event Management (SIEM)

Trending Courses

Popular Courses

Popular Platforms

Learn more about the Courses

Download the Careers360 App on your Android phone

Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile

Careers360 App
150M+ Students
30,000+ Colleges
500+ Exams
1500+ E-books