CYBER SECURITY & PREVENTIVE ANALYTICS COURSE

In our technology-centric world, as the world gets more connected, it also gets less safe. Cybersecurity is one of the fastest growing and in-demand professions. Cybersecurity professionals are required to evaluate, design and implement security plans, conduct an in-depth fraud investigation and perform security research and risk assessment and propose solutions to potential security breaches. Trained cyber security personnel works to reduce the risk of cyber-attacks in the organization and protects against the unauthorized exploitation of systems, networks and technologies.

Individuals with good security skills have great earning potential. To be considered for one of these high paying jobs, it is imperative to have the proper qualifications. To this effect, it is important to consider the industry certificates available for this career path.

Course Outline:

  • Deep insight into Cyber Security and its prospects.
  • Port and Vulnerability scanning
  • Firewalls & Deeper Understanding
  • Understanding Network Attacks & Exploring Architecture and IOT
  • Wireless security & Deeper Coverage
  • Understanding Network Monitoring and Threats
  • Getting familiar with Tracking and privacy
  • Deep understanding of Cyberattack life cycles
  • Advanced persistent threats and Commodity threats
  • Handling Phishing and Data Breaches

Learn How to:

  • Do risk analysis
  • Analyse Intruder techniques
  • Understand network protocols
  • Detect malicious codes
  • Understanding of security principles
Topic 1:
  • Introduction-
  • Deep insight into Cyber Security and its prospects.
Topic 2:
  • Introduction to Port and Vulnerability scanning
  • External vulnerability scanning
  • Internal vulnerability scanning
Topic 3:
  • Introduction to Firewalls
  • Host-based Firewalls: Windows, Linux, Mac
  • Network-based Firewalls: Hardware
  • Virtual based Firewalls
Topic 4:
  • Understanding Network Attacks
  • Exploring Architecture and IOT
Topic 5:
  • Introduction to Wireless security
  • Wired Equivalent Privacy (WEP)
  • Wi-Fi Protected Access- WPA and WPA2
  • Temporal Key Integrity Protocol (TKIP)
Topic 6:
  • Understanding Network Monitoring and Threats
  • Comprehensive introduction to Syslog
  • Working with Wireshark
  • Exploring TCP dump
Topic 7:
  • Getting familiar with Tracking and privacy
  • Types of tracking
  • Cookie tracking
  • Browser fingerprinting
  • Prevention methods on privacy breaches
Topic 8:
  • Deep understanding of Cyberattack life cycles
  • Stages of attack
  • Mitigation of each stage of an attack
  • Bad sources mitigation
  • Authentication types
Topic 9:
  • Advanced persistent threats and Commodity threats
  • Commodity threats and its types
  • APTs and types
  • Mitigation of above threats
Topic 10:
  • Introduction to Phishing and Data Breaches
  • Different ways of Phishing
  • Credential phishing
  • Data Breaches
  • Mitigation of above-mentioned breaches

Fees:

  • INR 30,000