Cyber Security
Prerequisite – Basic computer & network knowledge
Duration – 30 hrs
Training Fee includes the following :
- Class recordings
- Create Lab environment on your PC
- Software's
- Assignments
- E-Books & Other study materials.
Cyber Security
- Introduction to Cyber Security
- What is Cyber Security
- Common types of Cyber Security Threats
- What Cyber Security can prevent
- Careers in Cyber Security
- Impact of Cyber Security on your business
- How to minimise the impact of Cyber Attack on business
- Surface Web, Deep Web, Dark Web & Darknet
- Cyber Security Principles
- Case Study
- Types of Hackers
- Defence in depth
- Types of Security Policy
- Vulnerability Assessment
- Penetration Testing
- System Hacking & Securing Operating Systems Nontechnical Attacks or Non-Electronic Attacks
- Active Online Attacks
- Passive Online Attacks
- Spywares & Key loggers
- Steganography
- Steganalysis
- Guidelines To Secure Windows OS
- Malware Threats
- What is Malware
- Categories Of Malware
- Common Ways Malware Infects your Computer
- Computer malware Symptoms
- ways to prevent malware infection
- Network Sniffing
- What is Network Sniffing?
- Network Sniffing can
- How a Sniffer works?
- Protocols which are affected by Sniffing
- Hardware Protocol Analyzers
- How to Defend Against Sniffing
- Web browser Security
- Securing Web browsing VPN
- Proxy Server
- TOR
- Session Hijacking
- Countermeasures
- Securing Web browsing VPN
- Securing Email Communications
- Email Footprinting
- Email Encryption
- Social Engineering
- Social Engineering Concepts
- Impact of Attack on Organization
- Human Behaviours Vulnerable to Social Engineering attacks
- Factors that make companies vulnerable to attacks
- Social Engineering Prevention
- Social Engineering Techniques
- How to avoid being a victim
- What can you do if you are a victim
- Identity Theft
- Countermeasures
- DOS/DDOS Attacks
- DoS/DDoS Concepts
- Botnet
- Counter-measures
- Securing Mobile Devices
- Mobile Security - Attack Vectors
- Consequences of Attack Vectors
- Mobile Spam
- How to Secure iPhone and iPad Devices
- How to Secure Android Devices
- How to Secure Windows Device
- Securing Wireless Networks
- Wireless Concepts
- Wireless Encryption
- Best practices to improve the security of your wireless network
- Wireless Threats
- Counter-measures
- Securing The Cloud
- Introduction to Cloud Computing
- Cloud Computing Threats
- Cloud Computing Attacks
- Cloud Security
- Cryptography
- Cryptography Concepts
- Encryption
- Types of Encryption
- Diffie-Hellman Key Exchange
- Cryptographic Hash Functions
- Digital Signatures
- Digital Certificates
- Cryptography Tools
- Disk Encryption
- Data Backup and Disaster Recovery
- Data Backup Concepts
- Types of Data Backups
- Windows Backup and Restore Procedures
- Secure Data Destruction
- Information Security Law & Standards