Overview
Cyber Security Training is a boon for professionals of various levels and experiences, who are eager to learn about Software security, Hardware security, cryptography and much more.
Objectives
At the end of Cyber Security training course, participants will be able to
- Explain the concept of cybersecurity
- Discuss the fundamentals of cybersecurity
- Discuss enterprise network architecture and types
- Explain information security governance and risk assessment
Explain incident management
Prerequisites
- Basic Computer Knowledge
Course Outline
Introductionedforce2021-07-01T14:01:50+05:30
- Introduction to Virus
- Types of cyber threats
- Cyber criminals
- What is Cybersecurity?
Basics of Cybersecurityedforce2021-07-01T14:02:25+05:30
- Basics of Cybersecurity
- CIA Triad
- Software codes and security
- Security Management Plan and its types
- Security policies and its types
- Security policy framework
- Cybersecurity Mitigation Methods
- In-depth approach
Network Architecture and Typesedforce2021-07-01T14:03:06+05:30
- Enterprise Network Architecture
- Enterprise Network Architecture: Component
- Network
- OSI (Open System Interconnection)
- SNA (Systems Network Architecture)
- Wireless Network Types
- Wireless Network Attacks
- Wireless Attack Countermeasures
- Virtual Private Network(VPN)
- VPN Security Concerns
- Firewall
- Vulnerability Scanning
- Penetration Testing
- Security Audits
Information Security Governance and Risk Assessmentedforce2021-07-01T14:03:37+05:30
- IT security governance and its components
- Why is management support important?
- Types of management support
- Performance management: types
- Risk management methods
- IT Risk management framework
- Information security programs
- Information security programs components
- Information security programs frameworks
- Outcomes of IS program
- Supply chain management
Incident Managementedforce2021-07-01T14:04:03+05:30
- Incident Response
- Incident management team(IMT)
- Business Continuity vs. Disaster Recovery
- Business Continuity Planning Lifecycle
- Disaster Recovery Sites
- Three Stages of Disaster Recovery Sites
- Disaster Recovery Testing
- Virtualization
- Hypervisor: Types
- Cloud Computing
- Types of Cloud Computing
- Bring Your Own Device(BYOD)
- IoT (Internet of Things)
- IoT (Internet of Things): Security Challenges