Cyber Secuirty Course Content
Overview:
Cybersecurity also referred as Information Technology Security. Cybersecurity is the protection from cyberattacks to internet-connected systems, including hardware, software and data. Information security, which is designed to maintain the confidentiality, integrity and availability of data, is a subset of cybersecurity. Cybersecurity refers to body of technologies, processes and practices designed to protect network devices, data and programs from attack or unauthorized access.
The purpose of cybersecurity is to help prevent cyberattacks, data breaches and identity theft and can aid in risk management.
Training Objective (What you will learn)
Identify, evaluate and treat cyber risk and improve their organization’s security. Undertake responsive measures to reduce business risk exposure to within risk appetite, with constrained resources and within budget. You’ll learn how to protect computer operating systems, networks, and data from cyber-attacks, how to monitor systems and mitigate threats when they happen.
Prerequisites
You need to be good at:
1. Computer Networking
2. Languages i.e. Python, Ruby, Perl, PHP and Javascript
3. Linux, Unix, Bash and Powershell
4. Understanding Web Application's architecture and HTTP/HTTPS communication
5. Assembly Language
Market Demand
As per the market predictions there will be 3.5 million unfilled cybersecurity positions by 2021.
The cybersecurity jobs forecasts have been unable to keep pace with the dramatic rise in cybercrime, which is predicted to cost the world $6 trillion annually by 2021, up from $3 trillion in 2015.
Security Concepts and Mechanisms
- Basics of Communication Systems
- Transmission Media
- ISO/OSI and TCP/IP Protocol Stacks
- Local Area Networks
- Wide Area Networks
- Internetworking
- Packet Formats
- Wireless Networks
- The Internet
- Information Security Overview
- Information Security Services
- Types of Attacks
- Goals for Security
- E-commerce Security
- Computer Forensics
- Steganography
- Security Engineering
- Overview of Security threats
- Hacking Techniques
- Password Cracking
- Insecure Network connections
- Malicious Code
- Programming Bugs
- Cyber crime and Cyber terrorism
- Information Warfare and Surveillance
- Introduction to Cryptography
- Symmetric key Cryptography
- Asymmetric key Cryptography
- Message Authentication and Hash functions
- Digital Signatures
- Public Key infrastructure
- Diffe-Hellman key exchange proptocol
- Applications of Cryptography
Security Management
- Overview of Security Management
- Information Classification Process
- Security Policy
- Risk Management
- Security Procedures and Guidelines
- Business Continuity and Disaster Recovery
- Security Assurance
- Security Laws
- International Standards
- Security Audit
- OCTAVE Approach
- SSE-CMM 3
Network Security
- Overview of Identification and Authorization
- I & A Techniques
- Overview of IDS
- Intrusion Detection Systems and Intrusion Prevention Systems
- User Management
- DNS Routing and Load Balancing
- Overview of Firewalls
- Types of Firewalls
- DMZ and firewall features
- Introduction to assemblies
- Security in Multimedia Networks
- Fax Security
- Link Encryption Devices
System and Application Security
- Desiging Secure Operating Systems
- Controls to enforce security services
- Information flow model and Biba model
- Data accessing through crystal reports
- email security: PGP and SMIME
- Web Security: web authentication, SSL and SET
- OS Security Vulnerabilities, updates and patches
- OS integrity checks
- Anti-virus software
- Design of secure OS and OS hardening
- Configuring the OS for security
- Trusted OS