Introduction to Cyber Security CompTIA S+ and CEH
About Course
The NASSCOM aligned Cyber Security Training program will equip you with the full range of skills needed to become an expert in this rapidly growing domain. With this program you will learn comprehensive approaches to protecting your infrastructure, including securing data and information, running risk analysis and mitigation, architecting cloud- based security, achieving compliance and much more with this best- in-class program. This program is designed to earn knowledge set of Security and ethical hacking practices.
What Will You Learn?
- • Understand cyber terms, cyber threats, cyber analysis, cybercrimes and laws associated with cyber security.
- • Gain theoretical knowledge & practical understanding of installation, Configuration, Incident management and threat analysis of security solutions.
- • Learn multiple tools & languages to stand apart to gain a foothold in the Cyber Security industry
- • Learn about the major applications of cyber security across various fields like customer service, financial services, healthcare
- • Master the concepts and strategies of ethical hacking to protect the infrastructure.
- • Learn Application Security, Data Secrecy, Cryptography, Network Security and much more
- • Be a cyber-expert
Course Content
Module1: Assessment
-
Module 1: Assessment
Module 1: Introduction to Cyber Security
This module is designed for beginners to give a foundational understanding at today’s cybersecurity landscape and provide the tools to evaluate and manage security protocols in information processing systems.
Topics covered:
Course Introduction
Cyber Security Fundamentals
Enterprise Architecture and Components
Information System Governance and Risk Assessment
Incident Management
-
Basics of Information Security
02:55 -
Evolution of Information Security
03:17 -
Basic Principals of Information Security
03:06 -
Critical Concepts of Information Security
02:08 -
Components of Information Security
02:42 -
Balancing Information Security and Access
02:31 -
Implementing IT Security
02:43 -
Perform the acitivities mentioned in the attached file. Also put the comments post completion in the text box area of assignment submission
Module 2: Understanding Security Basics
-
Understanding Core Security Goals
04:16 -
Understanding Identity and Access Management
06:23 -
Exploring Network Technologies and Tools
05:37 -
Securing Your Network
06:01 -
Securing Hosts and Data
04:15 -
Comparing Threats, Vulnerabilities and Attacks
04:15 -
Protecting Against Advanced Attacks
07:33 -
Using Risk Management Tools
03:52 -
Implementing Controls to protect assets
03:40 -
Understanding Cryptography
04:50
Live Session Recordings
-
Introduction to Information Security
02:00:12 -
Basic Principals of Information Security
02:00:29 -
Critical Concepts of Information Security
02:01:24 -
Implementing IT Security
01:56:29 -
Understanding Security Basics
02:04:03 -
Introducing Basic Risk Concepts
01:49:09 -
Understanding Security Controls
02:03:48 -
Factors of Authentication
02:00:46 -
Basic Networking Protocols
01:58:13 -
Intrusion Detection System
02:02:04 -
Wireless Attacks
01:34:06 -
Data Loss Prevention
02:00:44 -
Social Engineering
01:57:58 -
Protecting Against Advanced Attacks
02:03:46 -
DNS Attacks
02:03:09 -
Database Concepts and Threats
01:59:04 -
Implementing Controls to Protect Assets
01:55:41 -
Ethical Hacking, Ethics and Legality
02:01:08 -
Configuring Maltego
02:01:04 -
Deep Dive into Maltego
02:04:53 -
Types of Attacks
02:01:31 -
Information Security Attacks
02:02:20 -
Handson Session
01:57:30 -
Handson Security Concepts
01:58:30 -
13Oct Handson Session
01:58:08 -
Attacks and Footprinting Concepts
01:56:41 -
Enumeration
02:01:23 -
System Hacking
01:54:23 -
Viruses and Worms
02:01:21 -
Session Hijacking
02:04:08 -
Handson Session
02:01:58
Module 2 : Assessment
-
Module 2: Assessment
Module 3: Assessment
-
Module 3 Assessment
Final Course Assessment.
-
Final Course Assessment