Currently Empty: ₹0
Cyber Security Course
Course Description
This Cyber Security course provides a comprehensive introduction to the principles and practices of securing digital systems. You will explore various cybersecurity streams, understand common threats, and learn the importance of secure password management. The course covers cryptography, security audits, scanning and patching, and response to cyber threats. You will also delve into specialized tools and techniques for penetration testing, Linux security, and more. Practical tasks and real-time scenarios are included to help you apply your skills and prepare for real-world challenges.
What You Will Learn
- Introduction to Cyber Security and its various streams.
- Understanding and managing common threats and secure password practices.
- Basics of cryptography and its practical applications.
- Conducting security audits and handling cyber security practices.
- Recognizing and responding to various cyber threats and attacks.
- Linux basics, penetration testing, and the use of specialized cyber security tools.
- Implementing and managing security measures and tools for real-time applications.
Course Curriculum
- Introduction to Cyber Security
- Introduction to Cyber Security
- Cybersecurity Streams
- Common Threats Against Password
- Importance of Securely Managing Password
- Cryptography
- Cryptography
- Cryptography Practical
- Cyber Security Practices
- Security Audit
- Scanning & Patching
- Sniffing, DOS
- Vendor Risk Management
- Risk Identification
- Risk Assessment
- Risk Response & Mitigation
- Cyber Security Exception Handling
- Cyber Security Privacy
- Security Architecture Practice
- Cyber Threats and Response
- Malware Threats
- Cyber Security Governance
- Social Engineering
- Cyber Security Forensics
- Phishing Email Simulator
- Investigation, Certification & Attestation
- Linux and Penetration Testing
- Basic Linux Kernel
- Kali Linux
- TCP/IP Concepts
- Reconnaissance and Information Gathering
- Penetration Testing
- Penetration Testing (Continued)
- CEH (Certified Ethical Hacker)
- Email Spoofing
- Password Management
- Specialized Cyber Security Tools
- Python for Cyber Security
- IDPS (Intrusion Detection and Prevention System)
- Red Team
Real-Time Tasks
- Phishing Email Simulator: Design an email template that mimics a phishing attempt but doesn’t contain malicious links or attachments.
- Password Manager Implementation in Linux & Windows Environment using Bitwarden.
- Penetration Test Report
- Basic Intrusion Detection System for ARP Spoofing Detection
- Mobile App Security Assessment: Conduct a security assessment of a mobile application.
- Penetration Testing using Metasploit.
- Vulnerability Scanning and Reporting with OpenVAS.
- Reverse Engineering using Ghidra.
- OSINT (Open Source Intelligence) using Spiderfoot.