CYBER-SECURITY Online Training

  • (25 REVIEWS )

Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.

Description

Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.

Did you know?

Cyber security or information technology security are the techniques of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation.

Cyber security focuses on protecting computer systems from unauthorised access or being otherwise damaged or made inaccessible.

Course Objective

After the completion of this course, Trainee will:
In recent years, numerous high-profile cyber attacks have resulted in sensitive data being exposed. For example, the 2017 Equifax breach compromised the personal data of roughly 143 million consumers, including birth dates, addresses and Social Security numbers. In 2018, Marriott International disclosed that hackers accessed its servers and stole the data of roughly 500 million customers. In both instances, the cyber security threat was enabled by the organization’s failure to implement, test and retest technical safeguards, such as encryption, authentication and firewalls.

Pre-requisites

1. Prior programming experience is desirable but not necessary along with familiarity with basic concepts like variables and scope, functions and flow control
2. Basic knowledge of object-oriented programming concepts is preferred but not mandatory

Who should attend this Training?

This certification is highly suitable for a wide range of professionals either aspiring to or are already in the IT domain, such as:
1.Anyone starting a career in Information / Cyber security
2.IT professionals wanting to transition their career into Cyber Security
3.Anyone needing a robust introduction to Cyber Security
4.Anyone planning to work in a position that requires cyber security knowledge
5.Anyone with information / cyber security responsibilities
6.Anyone who has learned “on the job” but who would benefit from a formal presentation to consolidate their knowledge
7.Professionals familiar with basic IT and information security concepts and who need to round out their knowledge

How will I perform the practical sessions in Online training?

For online training, US GlobalSoft provides the virtual environment that helps in accessing each other’s system. The detailed pdf files, reference material, course code are provided to the trainee. Online sessions can be conducted through any of the available requirements like Skype, WebEx, GoToMeeting, Webinar, etc.

Python Course Syllabus

Course Content
Security Concepts and Mechanisms

    1. Networking Concepts Overview
    2. Basics of Communication Systems
    3. Transmission Media
    4. ISO/OSI and TCP/IP Protocol Stacks
    5. Local Area Networks
    6. Wide Area Networks
    7. Internetworking
    8. Packet Formats
    9. Wireless Networks
    10. The Internet

Information Security Concepts

    1. Information Security Overview
    2. Information Security Services
    3. Types of Attacks
    4. Goals for Security
    5. E-commerce Security
    6. Computer Forensics
    7. Steganography
    8. Security Engineering

Security Threats and vulnerabilities

    1. Overview of Security threats
    2. Hacking Techniques
    3. Password Cracking
    4. Insecure Network connections
    5. Malicious Code
    6. Programming Bugs
    7. Cybercrime and Cyber terrorism
    8. Information Warfare and Surveillance

Cryptography

    1. Introduction to Cryptography
    2. Symmetric key Cryptography
    3. Asymmetric key Cryptography
    4. Message Authentication and Hash functions
    5. Digital Signatures
    6. Public Key infrastructure
    7. Diffe-Hellman key exchange protocol
    8. Applications of Cryptography

Security Management

    1. Security Management Practices
    2. Overview of Security Management
    3. Information Classification Process
    4. Security Policy
    5. Risk Management
    6. Security Procedures and Guidelines
    7. Business Continuity and Disaster Recovery

Security Laws and Standards

    1. Security Assurance
    2. Security Laws
    3. International Standards
    4. Security Audit
    5. OCTAVE approach
    6. SSE-CMM 3:

Network Security Access Control and Intrusion Detection

    1. Overview of Identification and Authorization
    2. I A Techniques
    3. Overview of IDS
    4. Intrusion Detection Systems and Intrusion Prevention Systems

Server Management and Firewalls

    1. User Management
    2. DNS Routing and Load Balancing
    3. Overview of Firewalls
    4. Types of Firewalls
    5. DMZ and firewall features

    Security for VPN and Next Generation Networks

      1. VPN Security
      2. Security in Multimedia Networks
      3. Fax Security
      4. Link Encryption Devices

    System and Application Security

      1. Security Architectures and Models
      2. Desiging Secure Operating Systems
      3. Controls to enforce security services
      4. Information flow model and Biba model

    System Security

      1. Desktop Security
      2. email security: PGP and SMIME
      3. Web Security: web authentication, SSL and SET

    OS Security

      1. OS Security Vulnerabilities, updates and patches
      2. OS integrity checks
      3. Anti-virus software
      4. Design of secure OS and OS hardening
      5. Configuring the OS for security

Prepare for Certification

Our training and certification program gives you a solid understanding of the key topics covered on the Oreilly’s CYBER-SECURITY Certification. In addition to boosting your income potential, getting certified in CYBER-SECURITY demonstrates your knowledge of the skills necessary to be a successful CYBER-SECURITY Developer. The certification validates your ability to produce reliable, high-quality results with increased efficiency and consistency.