Loading...

Cybersecurity

Course Content

  • What is Cyber Security
  • Overview
  • Need and Importance
  • Different Verticals
  • The Evolution of Cybersecurity
  • Cybersecurity & Situational Awareness
  • The Cybersecurity Skills Gap

  • HIPAA
  • FISMA
  • GDPR
  • IT-ACT
  • PCI-DSS

  • LAN, WLAN, WAN, MAN, PAN, SAN, CAN, VPN

  • Virus
  • Malware
  • Rootkits
  • RAT’s
  • Spyware
  • Adware
  • Scareware
  • PUPs
  • CPU Mining and Cryptojackers

  • Phishing
  • Vishing
  • SMShing
  • Spamming
  • Doxing

  • Spies and Secrets
  • Indian Cyber Organizations

  • Risk management
  • Common Attack Types & VectorsMap
  • Policies & Procedures
  • Cybersecurity Controls

  • Overview of Security Architecture
  • The OSI Model
  • Firewalls
  • Isolation & Segmentation
  • Monitoring, Detection, and Logging
  • Cryptography Fundamentals
  • Encryption Techniques
  • Encryption Applications

  • Process Controls – Risk Assessments
  • Process Controls – Vulnerability Management
  • Process Controls – Penetration Testing
  • Network Security
  • Operating System Security
  • Application Security
  • Data Security

  • Comparing Event and Incident
  • Security Incident Response
  • Investigations, Legal Holds, and Preservation
  • Forensics
  • Disaster Recovery and Business Continuity Plans

  • Current Threat Landscape
  • Advanced persistent threats (APT’s)
  • Mobile Technology – Vulnerabilities, Threats, and Risk
  • Consumerization of IT and Mobile Devices
  • Cloud and Digital Collaboration

  • Types
  • Ransomware
  • Detection
  • Analysis

  • Introduction
  • Foot Printing and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS
  • Firewalls and Honeypots
  • Hacking Web Servers
  • SQL Injection
  • Hacking – Wireless Networks
  • Mobile Platforms
  • IoT

  • Infrastructure Security: Network Level, Host Level, and Application-Level Security
  • Data security and Storage: Data Privacy and Security Issues, Jurisdictional Issues Raised by Data Location
  • Access Control
  • Trust, Reputation, Risk
  • Authentication in Cloud Computing, Client Access in Cloud, Cloud Contracting Model, Commercial and Business Considerations