Overview
Cyber Security Training is a boon for professionals of various levels and experiences, who are eager to learn about Software security, Hardware security, cryptography and much more.
Objectives
At the end of Cyber Security training course, participants will be able to
Prerequisites
- Basic Computer Knowledge
Course Outline
- Introduction to Virus
- Types of cyber threats
- Cyber criminals
- What is Cybersecurity?
- Basics of Cybersecurity
- CIA Triad
- Software codes and security
- Security Management Plan and its types
- Security policies and its types
- Security policy framework
- Cybersecurity Mitigation Methods
- In-depth approach
- Enterprise Network Architecture
- Enterprise Network Architecture: Component
- Network
- OSI (Open System Interconnection)
- SNA (Systems Network Architecture)
- Wireless Network Types
- Wireless Network Attacks
- Wireless Attack Countermeasures
- Virtual Private Network(VPN)
- VPN Security Concerns
- Firewall
- Vulnerability Scanning
- Penetration Testing
- Security Audits
- IT security governance and its components
- Why is management support important?
- Types of management support
- Performance management: types
- Risk management methods
- IT Risk management framework
- Information security programs
- Information security programs components
- Information security programs frameworks
- Outcomes of IS program
- Supply chain management
- Incident Response
- Incident management team(IMT)
- Business Continuity vs. Disaster Recovery
- Business Continuity Planning Lifecycle
- Disaster Recovery Sites
- Three Stages of Disaster Recovery Sites
- Disaster Recovery Testing
- Virtualization
- Hypervisor: Types
- Cloud Computing
- Types of Cloud Computing
- Bring Your Own Device(BYOD)
- IoT (Internet of Things)
- IoT (Internet of Things): Security Challenges