- Introduction to Cybersecurity
- The evolution of Cybersecurity
- Cybersecurity & situational awareness
- The Cybersecurity skills gap
- Difference between Information Security & Cybersecurity
- Protecting digital assets
- Cybersecurity objectives
- Confidentiality, integrity, & availability
- Cybersecurity roles
- Governance, risk management, & compliance
- What does a Cybersecurity professional do?
- Information Security roles
- Board of Directors
- Executive management
- Senior Information security management
- Cybersecurity practitioners
- Cybersecurity domains
- Cybersecurity concepts
- Security architecture principles
- Security of networks, systems, applications, & data
- Incident response
- Security implications & adoption of evolving technology
Quick Facts
particular | details | ||||
---|---|---|---|---|---|
Medium of instructions
English
|
Mode of learning
Self study, Virtual Classroom
|
Mode of Delivery
Video and Text Based
|
Frequency of Classes
Weekdays, Weekends
|
Course and certificate fees
Fees information
₹ 12,800 ₹15,360
certificate availability
Yes
certificate providing authority
Mindmajix Technologies
The syllabus
Introduction & Overview
Cybersecurity Concepts
- Risk
- Approaches to Cybersecurity
- Key terms & definitions
- Likelihood & impact
- Approaches to risk
- Third-party risk
- Risk management
Common attack types & vectors
- Threat agents
- Attack attributes
- Generalized attack process
- Non-adversarial threat events
- Malware & attack types
Policies & procedures
- Policy life cycle
- Guidelines
- Policy frameworks
- Types of Information Security policies
- Access control policy
- Personnel Information Security policy
- Security incident response policy
Cybersecurity controls
- Identity management
- Provisioning & de-provisioning
- Authorization
- Access control lists
- Privileged user management
- Change management
- Configuration management
- Patch management
- Encryption techniques
- Symmetric (private) key encryption
- Asymmetric (private) key encryption
- Elliptical curve cryptography
- Quantum cryptography
- Advanced encryption standard
- Digital signature
- Virtual private network
- Wireless network protections
- Stored data
- Public key infrastructure
Encryption applications
- Applications of cryptographic systems
Security of Networks, Systems, Applications, & Data
- Process controls – risk assessments
- Attributes of risk
- Risk response workflow
- Risk analysis
- Evaluating security controls
- Risk assessment success criteria
- Managing risk
- Using the results of the risk assessment
- Process controls – vulnerability management
- Vulnerability management
- Vulnerability scans
- Vulnerability assessment
- Remediation
- Reporting & metrics
- Process controls – penetration testing
- Penetration testers
- Penetration testing phases
Network security
- Network management
- LAN/WAN security
- Network risks
- Wireless local area networks
- Wired equivalent privacy & Wi-Fi protected access (WPA/WPA2)
- Ports & protocols
- Port numbers
- Protocol numbers & assignment services
- Virtual private networks
- Remote access
- Lab: Recon
- Scanning
- Banner grabbing
- Hacking System
Operating system security
- System/platform hardening
- Modes of operations
- File system permissions
- Credentials & privileges
- Command-line knowledge
- Logging & system monitoring
- Virtualization
- Specialized systems
- Lab:- OS Hardening
Application security
- Web application Security
- System development life cycle (SDLC)
- Security within SDLC
- Design requirements
- Testing
- Review process
- Separation of development, testing, & production environments
- OWASP top ten
- Wireless application protocol (WAP)
- Lab- SQL injection
- XSS attack
- Sqlmap
Data security
- Data classification
- Data owners
- Data classification requirements
- Database security
- Lab : Database Lab
Incident Response
- Event vs. incident
- Events vs. incident
- Types of incidents
- Security incident response
- What is incident response?
- Why do we need incident response?
- Elements of an incident response plan
- Security event management
- Investigations, legal holds, & preservation
- Investigations
- Evidence preservation
- Legal requirements
Forensics
- Data protection
- Data acquisition
- Imaging
- Extraction
- Interrogation
- Ingestion/normalization
- Reporting
- Network traffic analysis
- Logfile analysis
- Timelines
- Anti-forensics
- Lab-Imaging and Analysis
Disaster recovery & business continuity plans
- What is a disaster?
- Business continuity & disaster recovery
- Business impact analysis
- Recovery time objectives (RTO)
- Recover point objective (RPO)
- IS business continuity planning
- Recovery concepts
- Backup procedures
Security Implications & Adoption of Evolving Technology
- Current threat landscape
- Advanced persistent threats (APTs)
- Evolution of the threat landscape
- Defining APTs
- APT characteristics
- APT targets
- Stages of an APT attack
vulnerabilities, threats, & risk
- Physical risk
- Organizational risk
- Technical risk
- Activity monitoring & data retrieval
- Unauthorized network connectivity
- Web view/user interface (UI) impersonation
- Sensitive data leakage
- Unsafe sensitive data storage
- Unsafe sensitive data transmission
- Drive-by vulnerabilities
- Consumerization of IT & mobile devices
- Consumerization of IT
- BYOD
Cloud, Mobile technology & digital collaboration
- Risk of cloud computing
- Web application risk
- Benefits of cloud computing
- Risk of IoT
Practice Test & Interview Questions
Instructors
Articles
Popular Articles
prev
next
Latest Articles
prev
next