Introduction to Cyber Security CompTIA S+ and CEH
About Course
- The NASSCOM aligned Cyber Security Training program will equip you with the full range of skills needed to become an expert in this rapidly growing domain.
- With this program you will learn comprehensive approaches to protecting your infrastructure, including securing data and information, running risk analysis and mitigation, architecting cloud- based security, achieving compliance and much more with this best- in-class program.
- This program is designed to earn knowledge set of Security and ethical hacking practices.
What Will You Learn?
- Understand cyber terms, cyber threats, cyber analysis, cybercrimes and laws associated with cyber security.
- Gain theoretical knowledge & practical understanding of installation, Configuration, Incident management and threat analysis of security solutions.
- Learn multiple tools & languages to stand apart to gain a foothold in the Cyber Security industry
- Learn about the major applications of cyber security across various fields like customer service, financial services, healthcare
- Master the concepts and strategies of ethical hacking to protect the infrastructure.
- Learn Application Security, Data Secrecy, Cryptography, Network Security and much more
- Be a cyber-expert
Course Content
Module1: Assessment
-
Module 1: Assessment
Module 1: Introduction to Cyber Security
This module is designed for beginners to give a foundational understanding at today’s cybersecurity landscape and provide the tools to evaluate and manage security protocols in information processing systems.
Topics covered:
Course Introduction
Cyber Security Fundamentals
Enterprise Architecture and Components
Information System Governance and Risk Assessment
Incident Management
-
Basics of Information Security
02:55 -
Evolution of Information Security
03:17 -
Basic Principals of Information Security
03:06 -
Critical Concepts of Information Security
02:08 -
Components of Information Security
02:42 -
Balancing Information Security and Access
02:31 -
Implementing IT Security
02:43 -
Perform the acitivities mentioned in the attached file. Also put the comments post completion in the text box area of assignment submission
Module 2: Understanding Security Basics
-
Understanding Core Security Goals
04:16 -
Understanding Identity and Access Management
06:23 -
Exploring Network Technologies and Tools
05:37 -
Securing Your Network
06:01 -
Securing Hosts and Data
04:15 -
Comparing Threats, Vulnerabilities and Attacks
04:15 -
Protecting Against Advanced Attacks
07:33 -
Using Risk Management Tools
03:52 -
Implementing Controls to protect assets
03:40 -
Understanding Cryptography
04:50
Live Session Recordings
-
Introduction to Information Security
02:00:12 -
Basic Principals of Information Security
02:00:29 -
Critical Concepts of Information Security
02:01:24 -
Implementing IT Security
01:56:29 -
Understanding Security Basics
02:04:03 -
Introducing Basic Risk Concepts
01:49:09 -
Understanding Security Controls
02:03:48 -
Factors of Authentication
02:00:46 -
Basic Networking Protocols
01:58:13 -
Intrusion Detection System
02:02:04 -
Wireless Attacks
01:34:06 -
Data Loss Prevention
02:00:44 -
Social Engineering
01:57:58 -
Protecting Against Advanced Attacks
02:03:46 -
DNS Attacks
02:03:09 -
Database Concepts and Threats
01:59:04 -
Implementing Controls to Protect Assets
01:55:41 -
Ethical Hacking, Ethics and Legality
02:01:08 -
Configuring Maltego
02:01:04 -
Deep Dive into Maltego
02:04:53 -
Types of Attacks
02:01:31 -
Information Security Attacks
02:02:20 -
Handson Session
01:57:30 -
Handson Security Concepts
01:58:30 -
13Oct Handson Session
01:58:08 -
Attacks and Footprinting Concepts
01:56:41 -
Enumeration
02:01:23 -
System Hacking
01:54:23 -
Viruses and Worms
02:01:21 -
Session Hijacking
02:04:08 -
Handson Session
02:01:58
Module 2 : Assessment
-
Module 2: Assessment
Module 3: Assessment
-
Module 3 Assessment
Final Course Assessment.
-
Final Course Assessment