Cyber Security

Live Online (VILT) & Classroom Corporate Training Course

edForce Cyber Security trainings

Get acquainted with the new era of security with the cyber security basics like security governance and risk assessment.

How can we help you?

  • CloudLabs
  • Projects
  • Assignments
  • 24x7 Support
  • Lifetime Access

Cyber Security

Overview

Cyber Security Training is a boon for professionals of various levels and experiences, who are eager to learn about Software security, Hardware security, cryptography and much more.

Objectives

At the end of Cyber Security training course, participants will be able to

  • Explain the concept of cybersecurity
  • Discuss the fundamentals of cybersecurity
  • Discuss enterprise network architecture and types
  • Explain information security governance and risk assessment
  • Explain incident management

Prerequisites

  • Basic Computer Knowledge

Course Outline

Introduction2021-07-01T14:01:50+05:30
  • Introduction to Virus
  • Types of cyber threats
  • Cyber criminals
  • What is Cybersecurity?
Basics of Cybersecurity2021-07-01T14:02:25+05:30
  • Basics of Cybersecurity
  • CIA Triad
  • Software codes and security
  • Security Management Plan and its types
  • Security policies and its types
  • Security policy framework
  • Cybersecurity Mitigation Methods
  • In-depth approach
Network Architecture and Types2021-07-01T14:03:06+05:30
  • Enterprise Network Architecture
  • Enterprise Network Architecture: Component
  • Network
  • OSI (Open System Interconnection)
  • SNA (Systems Network Architecture)
  • Wireless Network Types
  • Wireless Network Attacks
  • Wireless Attack Countermeasures
  • Virtual Private Network(VPN)
  • VPN Security Concerns
  • Firewall
  • Vulnerability Scanning
  • Penetration Testing
  • Security Audits
Information Security Governance and Risk Assessment2021-07-01T14:03:37+05:30
  • IT security governance and its components
  • Why is management support important?
  • Types of management support
  • Performance management: types
  • Risk management methods
  • IT Risk management framework
  • Information security programs
  • Information security programs components
  • Information security programs frameworks
  • Outcomes of IS program
  • Supply chain management
Incident Management2021-07-01T14:04:03+05:30
  • Incident Response
  • Incident management team(IMT)
  • Business Continuity vs. Disaster Recovery
  • Business Continuity Planning Lifecycle
  • Disaster Recovery Sites
  • Three Stages of Disaster Recovery Sites
  • Disaster Recovery Testing
  • Virtualization
  • Hypervisor: Types
  • Cloud Computing
  • Types of Cloud Computing
  • Bring Your Own Device(BYOD)
  • IoT (Internet of Things)
  • IoT (Internet of Things): Security Challenges
2023-01-06T13:58:56+05:30

Title

Go to Top