Course Content
- What is Cyber Security
- Overview
- Need and Importance
- Different Verticals
- The Evolution of Cybersecurity
- Cybersecurity & Situational Awareness
- The Cybersecurity Skills Gap
- HIPAA
- FISMA
- GDPR
- IT-ACT
- PCI-DSS
- LAN, WLAN, WAN, MAN, PAN, SAN, CAN, VPN
- Virus
- Malware
- Rootkits
- RAT’s
- Spyware
- Adware
- Scareware
- PUPs
- CPU Mining and Cryptojackers
- Phishing
- Vishing
- SMShing
- Spamming
- Doxing
- Spies and Secrets
- Indian Cyber Organizations
- Risk management
- Common Attack Types & VectorsMap
- Policies & Procedures
- Cybersecurity Controls
- Overview of Security Architecture
- The OSI Model
- Firewalls
- Isolation & Segmentation
- Monitoring, Detection, and Logging
- Cryptography Fundamentals
- Encryption Techniques
- Encryption Applications
- Process Controls – Risk Assessments
- Process Controls – Vulnerability Management
- Process Controls – Penetration Testing
- Network Security
- Operating System Security
- Application Security
- Data Security
- Comparing Event and Incident
- Security Incident Response
- Investigations, Legal Holds, and Preservation
- Forensics
- Disaster Recovery and Business Continuity Plans
- Current Threat Landscape
- Advanced persistent threats (APT’s)
- Mobile Technology – Vulnerabilities, Threats, and Risk
- Consumerization of IT and Mobile Devices
- Cloud and Digital Collaboration
- Types
- Ransomware
- Detection
- Analysis
- Introduction
- Foot Printing and Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Sniffing
- Social Engineering
- Denial-of-Service
- Session Hijacking
- Evading IDS
- Firewalls and Honeypots
- Hacking Web Servers
- SQL Injection
- Hacking – Wireless Networks
- Mobile Platforms
- IoT
- Infrastructure Security: Network Level, Host Level, and Application-Level Security
- Data security and Storage: Data Privacy and Security Issues, Jurisdictional Issues Raised by Data Location
- Access Control
- Trust, Reputation, Risk
- Authentication in Cloud Computing, Client Access in Cloud, Cloud Contracting Model, Commercial and Business Considerations