Cyber Security

Live Online (VILT) & Classroom Corporate Training Course

Get acquainted with the new era of security with the cyber security basics like security governance and risk assessment.
Cyber Security Logo

How can we help you?

  • CloudLabs
    CloudLabs
  • Projects
    Projects
  • Assignments
    Assignments
  • 24x7 Support
    24x7 Support
  • Lifetime Access
    Lifetime Access
Box

Overview

Cyber Security Training is a boon for professionals of various levels and experiences, who are eager to learn about Software security, Hardware security, cryptography and much more.

Box

Objectives

At the end of Cyber Security training course, participants will be able to

  • Explain the concept of cybersecurity
  • Discuss the fundamentals of cybersecurity
  • Discuss enterprise network architecture and types
  • Explain information security governance and risk assessment
  • Explain incident management
Box

Prerequisites

  • Basic Computer Knowledge
Box

Course Outline

  • Introduction to Virus
  • Types of cyber threats
  • Cyber criminals
  • What is Cybersecurity?

  • Basics of Cybersecurity
  • CIA Triad
  • Software codes and security
  • Security Management Plan and its types
  • Security policies and its types
  • Security policy framework
  • Cybersecurity Mitigation Methods
  • In-depth approach

  • Enterprise Network Architecture
  • Enterprise Network Architecture: Component
  • Network
  • OSI (Open System Interconnection)
  • SNA (Systems Network Architecture)
  • Wireless Network Types
  • Wireless Network Attacks
  • Wireless Attack Countermeasures
  • Virtual Private Network(VPN)
  • VPN Security Concerns
  • Firewall
  • Vulnerability Scanning
  • Penetration Testing
  • Security Audits

  • IT security governance and its components
  • Why is management support important?
  • Types of management support
  • Performance management: types
  • Risk management methods
  • IT Risk management framework
  • Information security programs
  • Information security programs components
  • Information security programs frameworks
  • Outcomes of IS program
  • Supply chain management

  • Incident Response
  • Incident management team(IMT)
  • Business Continuity vs. Disaster Recovery
  • Business Continuity Planning Lifecycle
  • Disaster Recovery Sites
  • Three Stages of Disaster Recovery Sites
  • Disaster Recovery Testing
  • Virtualization
  • Hypervisor: Types
  • Cloud Computing
  • Types of Cloud Computing
  • Bring Your Own Device(BYOD)
  • IoT (Internet of Things)
  • IoT (Internet of Things): Security Challenges
Box

Testimonials