Cyber Security Certification Training

BY
Simpliv Learning

Mode

Online

Duration

24 Hours

Quick Facts

particular details
Medium of instructions English
Mode of learning Virtual Classroom
Mode of Delivery Video Based
Frequency of Classes Weekdays

Course and certificate fees

certificate availability

Yes

certificate providing authority

Simpliv Learning

The syllabus

Cybersecurity & Ethical Hacking – Introduction

  • Need of Cybersecurity  
  • CIA Triad  
  • Security Architecture  
  • Security Governance  
  • Security Auditing  
  • Regulations & Frameworks  
  • Ethical Hacking  
  • Types of Hackers  
  • Phases of Ethical Hacking  
  • Penetration Testing  
  • Types of Penetration Testing  
  • Footprinting  
  • Objectives of Footprinting  
  • Types of Footprinting 

Cryptography

  • Types of cryptography  
  • Symmetric cryptography  
  • Asymmetric cryptography  
  • Hash functions  
  • Digital signatures  
  • Public Key Infrastructure (PKI)  
  • Attacks on cryptosystems 

Computer Networks & Security

  • Introduction to Computer Network  
  • Computer Networks - Architecture  
  • Layered architecture  
  • Open Systems Interconnect (OSI) Model  
  • Transmission Control Protocol/Internet Protocol (TCP/IP)  
  • Network Scanning  
  • Enumeration  
  • Common Network Threats/Attacks  

Application and Web Security

  • Web server architecture  
  • Web server attacks  
  • Countermeasures and patch management  
  • Web application architecture  
  • Web application attacks 

IdAM (Identity and Access Management)

  • Authentication and authorization  
  • Authentication and authorization principles  
  • Regulation of access  
  • Access administration  
  • IdAM  
  • Password protection  
  • Identity theft  

Vulnerability Analysis & System Hacking

  • Vulnerability Analysis  
  • Types of Vulnerability Analysis  
  • Vulnerability Assessment Lifecycle  
  • Vulnerability Assessment Tools  
  • Vulnerability Scoring Systems  
  • Vulnerability Assessments Report  
  • System Hacking  
  • Password Cracking  
  • Privilege escalation  
  • Executing Applications  
  • Hiding Files  
  • Clearing Logs  

Sniffing and SQL Injection

  • Malware and its propagation ways 
  • Malware components  
  • Types of malware  
  • Concept of sniffing  
  • Types of sniffing  
  • Types of sniffing attacks  
  • SQL injection  
  • Types of SQL injection  
  • SQL injection Methodologies  

DoS and Session Hijacking

  • DoS attack  
  • DDoS attack  
  • Common symptoms of DoS/DDoS attack  
  • Categories of DoS/DDoS Attack Vectors  
  • DoS/DDoS detection techniques  
  • Session hijacking  
  • Application-level session hijacking  
  • Network-level session hijacking  
  • Intrusion Detection System (IDS)  
  • Types of Intrusion Detection Systems  
  • Introduction to Firewalls  
  • Types of Firewalls  
  • Introduction to Honeypots  
  • Evading IDS  

Trending Courses

Popular Courses

Popular Platforms

Learn more about the Courses

Download the Careers360 App on your Android phone

Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile

Careers360 App
150M+ Students
30,000+ Colleges
500+ Exams
1500+ E-books