Cyber Security Course Content
Our Cybersecurity Course Curriculum is curated by industry professionals who are having more than 15+ years of experience in Cybersecurity platforms. In this training session, you'll learn Fundamentals of Cybersecurity, concepts, security architecture, and other advanced concepts in the Cybersecurity domain.
- Introduction to Cybersecurity
- The evolution of Cybersecurity
- Cybersecurity & situational awareness
- The Cybersecurity skills gap
- Difference between Information Security & Cybersecurity
- Protecting digital assets
- Cybersecurity objectives
- Confidentiality, integrity, & availability
- Cybersecurity roles
- Governance, risk management, & compliance
- What does a Cybersecurity professional do?
- Information Security roles
- Board of Directors
- Executive management
- Senior Information security management
- Cybersecurity practitioners
- Cybersecurity domains
- Cybersecurity concepts
- Security architecture principles
- Security of networks, systems, applications, & data
- Incident response
- Security implications & adoption of evolving technology
- Risk
- Approaches to Cybersecurity
- Key terms & definitions
- Likelihood & impact
- Approaches to risk
- Third-party risk
- Risk management
Common attack types & vectors
- Threat agents
- Attack attributes
- Generalized attack process
- Non-adversarial threat events
- Malware & attack types
Policies & procedures
- Policy life cycle
- Guidelines
- Policy frameworks
- Types of Information Security policies
- Access control policy
- Personnel Information Security policy
- Security incident response policy
Cybersecurity controls
- Identity management
- Provisioning & de-provisioning
- Authorization
- Access control lists
- Privileged user management
- Change management
- Configuration management
- Patch management
- Encryption techniques
- Symmetric (private) key encryption
- Asymmetric (private) key encryption
- Elliptical curve cryptography
- Quantum cryptography
- Advanced encryption standard
- Digital signature
- Virtual private network
- Wireless network protections
- Stored data
- Public key infrastructure
Encryption applications
- Applications of cryptographic systems
Security of Networks, Systems, Applications, & Data
- Process controls – risk assessments
- Attributes of risk
- Risk response workflow
- Risk analysis
- Evaluating security controls
- Risk assessment success criteria
- Managing risk
- Using the results of the risk assessment
- Process controls – vulnerability management
- Vulnerability management
- Vulnerability scans
- Vulnerability assessment
- Remediation
- Reporting & metrics
- Process controls – penetration testing
- Penetration testers
- Penetration testing phases
- Network management
- LAN/WAN security
- Network risks
- Wireless local area networks
- Wired equivalent privacy & Wi-Fi protected access (WPA/WPA2)
- Ports & protocols
- Port numbers
- Protocol numbers & assignment services
- Virtual private networks
- Remote access
- Lab: Recon
- Scanning
- Banner grabbing
- Hacking System