Cybersecurity Skilling Program

Advance your concepts and get hands-on training in Cybersecurity in this course. Apply now!

Course Highlights:

  • Focuses on the models, tools, and techniques for enforcing security, with some emphasis on using cryptography.
  • Provides a deeper understanding of the technical basics of cyberspace and cyber issues.
  • Provides learners with a baseline understanding of common cybersecurity threats, vulnerabilities, and risks.
  • Introduces real-time cyber security techniques and methods in the context of the protocol suites to introduce the need for network security solutions.

Duration

08 weeks (6 hours per week)

Course Duration

48 hours

Course Language

Hindi

Prerequisite

Basic knowledge of computer

Course Description

This course explores the most critical elements beyond technology that shape the playing field on which cybersecurity problems emerge and are managed. The course covers system security, malware analysis, network security, cryptography, and IoT security. It is a fully online course providing students both fundamental knowledge and hands-on experience. An integral part of the training is customized labs at every student’s desk through the cyber range

Course Modules

Network Security

  • Introduction to Networking
  • Fundamental of Network Security
  • Features of Network Security
  • Network Security Threats
  • Network Security Vulnerability and attacks
  • Security Monitoring and Control
  • Security Best Practices

Security Threats and Trends

  • Case study analysis and carbon mitigation strategies
  • Introductions to APT and Information Warfare
  • Introduction to Social Engineering
  • Countermeasure to address Social Engineering

Cryptography

  • Cryptography Fundamentals
  • Classical Encryption Techniques
  • Cryptographic Encryption Algorithms
  • Cryptographic Data Integrity Algorithm
  • Entity Authentication and Key Management
  • Key Distribution
  • Authentication Services
  • Infrastructural requirement for Security

Application Security

  • Application Security Introduction
  • Application Security Goals
  • WebGoat /DVWA Demo
  • OWASP top 10
  • Threat actor and more definitions (different attackers that threaten software and systems)
  • Defense in depth
  • Proxy tools
  • API Security

OS Security

  • Importance of File and Directory Permissions
  • Basic NT File System Permissions (Demo)
  • Understanding Linux Permissions
  • Windows Encrypted File System (Demo)
  • Tools for encryption (*BitLocker / VeraCrypt etc.)
  • Importance of Data Storage and Backups
  • Understanding of RAID (redundant array of independent disks)
  • Demo: Exploring Windows Backup
  • Demo: Linux Backup
  • Local vs. Cloud Storage and Backups
  • Introductions
  • Demo: Windows/Linux Firewall
  • 3rd Party Firewall
  • Introduction to Antivirus
  • Demo: Windows Defender Antivirus
  • Fundamental of User Account Control (UAC)
  • Windows UAC
  • Demo: UAC setting in Windows
  • Demo: Windows App and Browser Control
  • Demo: Controlled Folder Access
  • Relevance of Patching
  • Demo: Windows and Linux updates
  • Why Software updates is important?
  • Securing the Boot Process
  • Demo: Checking Secure Boot Status in Windows
  • Demo: Disabling Unnecessary Services and Processes

Copyright © 2023