Cyber Security Training In Hyderabad

BY
Mindmajix Technologies

Mode

Online

Quick Facts

particular details
Medium of instructions English
Mode of learning Self study, Virtual Classroom
Mode of Delivery Video and Text Based
Frequency of Classes Weekdays, Weekends

Course and certificate fees

certificate availability

Yes

certificate providing authority

Mindmajix Technologies

The syllabus

Introduction & Overview

  • Introduction to Cybersecurity
  • The evolution of Cybersecurity
  • Cybersecurity & situational awareness
  • The Cybersecurity skills gap
  • Difference between Information Security & Cybersecurity
  • Protecting digital assets
  • Cybersecurity objectives
  • Confidentiality, integrity, & availability
  • Cybersecurity roles
  • Governance, risk management, & compliance
  • What does a Cybersecurity professional do?
  • Information Security roles
  • Board of Directors
  • Executive management
  • Senior Information security management
  • Cybersecurity practitioners
  • Cybersecurity domains
  • Cybersecurity concepts
  • Security architecture principles
  • Security of networks, systems, applications, & data
  • Incident response
  • Security implications & adoption of evolving technology

Cybersecurity Concepts

  • Risk
  • Approaches to Cybersecurity
  • Key terms & definitions
  • Likelihood & impact
  • Approaches to risk
  • Third-party risk
  • Risk management
Common attack types & vectors
  • Threat agents
  • Attack attributes
  • Generalized attack process
  • Non-adversarial threat events
  • Malware & attack types
Policies & procedures
  • Policy life cycle
  • Guidelines
  • Policy frameworks
  • Types of Information Security policies
  • Access control policy
  • Personnel Information Security policy
  • Security incident response policy
Cybersecurity controls
  • Identity management
  • Provisioning & de-provisioning
  • Authorization
  • Access control lists
  • Privileged user management
  • Change management
  • Configuration management
  • Patch management
  • Encryption techniques
  • Symmetric (private) key encryption
  • Asymmetric (private) key encryption
  • Elliptical curve cryptography
  • Quantum cryptography
  • Advanced encryption standard
  • Digital signature
  • Virtual private network
  • Wireless network protections
  • Stored data
  • Public key infrastructure
Encryption applications
  • Applications of cryptographic systems
Security of Networks, Systems, Applications, & Data
  • Process controls – risk assessments
  • Attributes of risk
  • Risk response workflow
  • Risk analysis
  • Evaluating security controls
  • Risk assessment success criteria
  • Managing risk
  • Using the results of the risk assessment
  • Process controls – vulnerability management
  • Vulnerability management
  • Vulnerability scans
  • Vulnerability assessment
  • Remediation
  • Reporting & metrics
  • Process controls – penetration testing
  • Penetration testers
  • Penetration testing phases

Network security

  • Network management
  • LAN/WAN security
  • Network risks
  • Wireless local area networks
  • Wired equivalent privacy & Wi-Fi protected access (WPA/WPA2)
  • Ports & protocols
  • Port numbers
  • Protocol numbers & assignment services
  • Virtual private networks
  • Remote access
  • Lab: Recon
    • Scanning
    • Banner grabbing
    • Hacking System

Operating system security

  • System/platform hardening
  • Modes of operations
  • File system permissions
  • Credentials & privileges
  • Command-line knowledge
  • Logging & system monitoring
  • Virtualization
  • Specialized systems
  • Lab:- OS Hardening

Application security

  • Web application Security
  • System development life cycle (SDLC)
  • Security within SDLC
  • Design requirements
  • Testing
  • Review process
  • Separation of development, testing, & production environments
  • OWASP top ten
  • Wireless application protocol (WAP)
  • Lab- SQL injection
    • XSS attack
    • Sqlmap

Data security

  • Data classification
  • Data owners
  • Data classification requirements
  • Database security
  • Lab : Database Lab

Incident Response

  • Event vs. incident
  • Events vs. incident
  • Types of incidents
  • Security incident response
  • What is incident response?
  • Why do we need incident response?
  • Elements of an incident response plan
  • Security event management
  • Investigations, legal holds, & preservation
  • Investigations
  • Evidence preservation
  • Legal requirements

Forensics

  • Data protection
  • Data acquisition
  • Imaging
  • Extraction
  • Interrogation
  • Ingestion/normalization
  • Reporting
  • Network traffic analysis
  • Logfile analysis
  • Timelines
  • Anti-forensics
  • Lab-Imaging and Analysis

Disaster recovery & business continuity plans

  • What is a disaster?
  • Business continuity & disaster recovery
  • Business impact analysis
  • Recovery time objectives (RTO)
  • Recover point objective (RPO)
  • IS business continuity planning
  • Recovery concepts
  • Backup procedures

Security Implications & Adoption of Evolving Technology

  • Current threat landscape
  • Advanced persistent threats (APTs)
  • Evolution of the threat landscape
  • Defining APTs
  • APT characteristics
  • APT targets
  • Stages of an APT attack

vulnerabilities, threats, & risk

  • Physical risk
  • Organizational risk
  • Technical risk
  • Activity monitoring & data retrieval
  • Unauthorized network connectivity
  • Web view/user interface (UI) impersonation
  • Sensitive data leakage
  • Unsafe sensitive data storage
  • Unsafe sensitive data transmission
  • Drive-by vulnerabilities
  • Consumerization of IT & mobile devices
  • Consumerization of IT
  • BYOD

Cloud, Mobile technology & digital collaboration

  • Risk of cloud computing
  • Web application risk
  • Benefits of cloud computing
  • Risk of IoT

Practice Test & Interview Questions

Instructors

Mr Surender
Instructor
Freelancer

Trending Courses

Popular Courses

Popular Platforms

Learn more about the Courses

Download the Careers360 App on your Android phone

Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile

Careers360 App
150M+ Students
30,000+ Colleges
500+ Exams
1500+ E-books