Description
Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.
Did you know?
Cyber security or information technology security are the techniques of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation.
Cyber security focuses on protecting computer systems from unauthorised access or being otherwise damaged or made inaccessible.
Course Objective
After the completion of this course, Trainee will:
In recent years, numerous high-profile cyber attacks have resulted in sensitive data being exposed. For example, the 2017 Equifax breach compromised the personal data of roughly 143 million consumers, including birth dates, addresses and Social Security numbers. In 2018, Marriott International disclosed that hackers accessed its servers and stole the data of roughly 500 million customers. In both instances, the cyber security threat was enabled by the organization’s failure to implement, test and retest technical safeguards, such as encryption, authentication and firewalls.
Pre-requisites
1. Prior programming experience is desirable but not necessary along with familiarity with basic concepts like variables and scope, functions and flow control
2. Basic knowledge of object-oriented programming concepts is preferred but not mandatory
Who should attend this Training?
This certification is highly suitable for a wide range of professionals either aspiring to or are already in the IT domain, such as:
1.Anyone starting a career in Information / Cyber security
2.IT professionals wanting to transition their career into Cyber Security
3.Anyone needing a robust introduction to Cyber Security
4.Anyone planning to work in a position that requires cyber security knowledge
5.Anyone with information / cyber security responsibilities
6.Anyone who has learned “on the job” but who would benefit from a formal presentation to consolidate their knowledge
7.Professionals familiar with basic IT and information security concepts and who need to round out their knowledge
How will I perform the practical sessions in Online training?
For online training, US Global IT provides the virtual environment that helps in accessing each other’s system. The detailed pdf files, reference material, course code are provided to the trainee. Online sessions can be conducted through any of the available requirements like Skype, WebEx, GoToMeeting, Webinar, etc.
Python Course Syllabus
Course Content
Security Concepts and Mechanisms
- Networking Concepts Overview
- Basics of Communication Systems
- Transmission Media
- ISO/OSI and TCP/IP Protocol Stacks
- Local Area Networks
- Wide Area Networks
- Internetworking
- Packet Formats
- Wireless Networks
- The Internet
Information Security Concepts
- Information Security Overview
- Information Security Services
- Types of Attacks
- Goals for Security
- E-commerce Security
- Computer Forensics
- Steganography
- Security Engineering
Security Threats and vulnerabilities
- Overview of Security threats
- Hacking Techniques
- Password Cracking
- Insecure Network connections
- Malicious Code
- Programming Bugs
- Cybercrime and Cyber terrorism
- Information Warfare and Surveillance
Cryptography
- Introduction to Cryptography
- Symmetric key Cryptography
- Asymmetric key Cryptography
- Message Authentication and Hash functions
- Digital Signatures
- Public Key infrastructure
- Diffe-Hellman key exchange protocol
- Applications of Cryptography
Security Management
- Security Management Practices
- Overview of Security Management
- Information Classification Process
- Security Policy
- Risk Management
- Security Procedures and Guidelines
- Business Continuity and Disaster Recovery
Security Laws and Standards
- Security Assurance
- Security Laws
- International Standards
- Security Audit
- OCTAVE approach
- SSE-CMM 3:
Network Security Access Control and Intrusion Detection
- Overview of Identification and Authorization
- I A Techniques
- Overview of IDS
- Intrusion Detection Systems and Intrusion Prevention Systems
Server Management and Firewalls
- User Management
- DNS Routing and Load Balancing
- Overview of Firewalls
- Types of Firewalls
- DMZ and firewall features
- VPN Security
- Security in Multimedia Networks
- Fax Security
- Link Encryption Devices
- Security Architectures and Models
- Desiging Secure Operating Systems
- Controls to enforce security services
- Information flow model and Biba model
- Desktop Security
- email security: PGP and SMIME
- Web Security: web authentication, SSL and SET
- OS Security Vulnerabilities, updates and patches
- OS integrity checks
- Anti-virus software
- Design of secure OS and OS hardening
- Configuring the OS for security
Security for VPN and Next Generation Networks
System and Application Security
System Security
OS Security
Prepare for Certification
Our training and certification program gives you a solid understanding of the key topics covered on the Oreilly’s CYBER-SECURITY Certification. In addition to boosting your income potential, getting certified in CYBER-SECURITY demonstrates your knowledge of the skills necessary to be a successful CYBER-SECURITY Developer. The certification validates your ability to produce reliable, high-quality results with increased efficiency and consistency.