Cyber Security Professional Course

BY
Henry Harvin

Mode

Online

Duration

16 Hours

Fees

₹ 129000

Quick Facts

particular details
Medium of instructions English
Mode of learning Self study, Virtual Classroom
Mode of Delivery Video and Text Based
Frequency of Classes Weekends

Course and certificate fees

Fees information
₹ 129,000
certificate availability

Yes

certificate providing authority

Henry Harvin

The syllabus

Module 1 : Security Essentials

  • The need for Cyber Security
  • CIA Triad
  • Vulnerability, Threat, and Risk
  • Risk Governance & Risk Management
  • Security Architecture
  • Security Governance
  • Security Auditing
  • Compliance
  • Computer Security Architecture & Design
  • Quiz Module 1

Module 2 : Cryptography

  • Background of Cryptography
  • Symmetric Cryptography
  • Data Encryption Standard (DES)
  • Triple-DES
  • The Advanced Encryption Standard (AES)
  • International Data Encryption Algorithm (IDEA)
  • Blowfish
  • RC4
  • RC5
  • Digital Certificate life cycle (Initialize, Issue, Cancel)
  • Certificate Authority, Certificate Repository, Certificate Revocation lists
  • Digital Certificates and its Format (X.509, X.500)
  • Attacks against Encrypted Data
  • Cryptographic Hash Functions
  • Elliptic Curve Cryptosystems (ECC)
  • RSA
  • The Diffie-Hellman Algorithm
  • Asymmetric Cryptography
  • RC6
  • Quiz Module 2

Module 3: Computer Network & Security

  • Network Architecture, Protocols and Technologies:
  • Layered Architecture, Open Systems Interconnect (OSI) Model
  • Transmission Control Protocol / Internet Protocol (TCP/IP)
  • Hybrid TCP/IP Model
  • Application Layer Protocols: HTTP, SNMP, DNS, POP, SMTP
  • Transport layer protocols: Transmission Control Protocol (TCP), User Datagram Protocol (UDP)
  • Network/Internet layer protocols:
  • Internet Protocol (IP) v4, IPv6, IPsec protocols
  • Link-layer protocols: Address
  • Resolution Protocol (ARP) / Reverse ARP / Proxy ARP, Ethernet, VLAN
  • Quiz Module 3

Module 4: Application Security

  • SSDLC (Secure Software Development Life Cycle)
  • Quiz Module 4

Module 5: Data & Endpoint Security

  • Data Security
  • Data Security Controls
  • Host/ Endpoint Security Controls
  • Quiz Module  5

Module 6: IdAM (Identify & Access Management)

  • Authorization
  • Authentication
  • Access Control
  • Privilege levels
  • Identity & Access Management Process and activities (Role-Based, Single Sign-on)
  • Quiz Module 6

Module 7: Cloud Security

  • Cloud Computing Architectural Framework
  • Concerns & Best Practices
  • Governance and Enterprise Risk Management
  • Legal Issues: Contracts and Electronic Discovery
  • Compliance and Audit Management
  • Information Management and Data Security
  • Interoperability and Portability
  • Traditional Security, Business Continuity, and Disaster Recovery
  • Data Centre Operations
  • Incident Response
  • Application Security
  • Encryption and Key Management
  • Identity, Entitlement, and Access Management
  • Virtualization
  • Security as a Service
  • Quiz Module  7

Module 8: Phases of a Cyber Attack

  • Phase 1 —Reconnaissance: Adversary identifies and selects a Target
  • Phase 2 —Weaponize: Adversary packages an exploit into a payload designed to execute on the targeted computer/network
  • Phase 3 —Deliver: The adversary delivers the payload to the target system
  • Phase 4 —Exploit: Adversary code is executed on the target system
  • Phase 5 —Install: Adversary installs remote access software
  • that provides a persistent presence within the targeted environment or system
  • Phase 6 —Command and Control: Adversary employs remote access
  • mechanisms to establish a command and control channel with the compromised device
  • Phase 7 —Act on Objectives: Adversary pursues intended objectives e.g., data exfiltration, lateral movement to other targets
  • Quiz Module  8

Module 9: Security Processes in practice for Businesses

  • Key Security Business Processes
  • Corp. & Security Governance
  • IT Strategy management
  • Portfolio/Program/Project management
  • Change management
  • Supplier (third party) management
  • Problem management
  • Knowledge management
  • Info-sec management
  • BCP
  • IT Operations management
  • Overview of top 20 security controls
  • Quiz Module 9

Complimentary Module 1: Soft Skills Development

  • Business Communication
  • Preparation for the Interview
  • Presentation Skills

Complimentary Module 2: Resume Writing

  • Resume Building Technique

Trending Courses

Popular Courses

Popular Platforms

Learn more about the Courses

Download the Careers360 App on your Android phone

Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile

Careers360 App
150M+ Students
30,000+ Colleges
500+ Exams
1500+ E-books