Alpha

Advanced Cybersecurity for Professionals

by Coursmy Team

Book a Free Demo Enquire Now
Image Description
₹ 10000 Scholarship Scheme

One week free program

This Program includes

Share

What you'll learn

Describe the threats, Define the different classifications of Malware, Describe what DoS and DDos attacks are, Describe the stages of a hacking attack, Describe the basics of Information Security, Describe how to deploy Information Security controls

Program content

This course is suitable for IT professionals looking to understand more about online security, but is also a good introductory course for those from a non-IT background who need to understand more about the protection of company systems and data. Course Outline: This workshop is split into two key sections – one covering the threats associated with operating in cyber space, and one covering the basics of information security and the controls a company can implement to boost their security levels. Understanding Threats: This module concentrates on understanding the threats we face by defining what hackers are, their motivations, and the tools they use. This section takes a look at the processes involved in a hacking attack. Delegates will learn about footprinting, port scanning, network sniffing, phishing, social engineering, dumpster diving and physical attacks. Basics of information security: This module is dedicated to understanding the basics of Information Security and looks at how an organisation might approach the task of securing their networks against attacks. In this section, delegates will learn about security management systems, risk management, the implementation of security controls, penetration testing and incident management. At the end of this course you will be able to: · Describe the threats faced by organisations and individuals by hackers · Define the different classifications of Malware · Describe what DoS and DDos attacks are · Describe the stages of a hacking attack · Describe the basics of Information Security · Describe how to deploy Information Security controls within a network to defend against attack Target Audience: This course is suitable for IT professionals looking to understand more about online security, but is also a good introductory course for those from a non-IT background who need to understand more about the protection of company systems and data. Workshop Schedule: · Session 1 : 9 January 2021 · Session 2 : 10 January 2021

    Cybersecurity – 20 Hours (1st Course)

    • Overview & Introduction – 1 hour
    • Crypto Tools & Cryptography – 1 hour (optional)
    • User Authentication – 1 hour
    • Access Control – 1 hour
    • Database & Cloud Security– 1 hour
    • Malicious Software – 1 hour
    • Denial-of-Service attacks– 1 hour
    • Intrusion Detection – 1 hour
    • Firewalls & Intrusion Prevention Systems– 1 hour
    • SW Security & Trusted Systems – 1 hour
    • Operating System Security – 1 hour
    • Trusted Computing & Multi-level Security – 1 hour
    • IT Security & Risk Assessment – 1 hour
    • IT Security Control, Plans & Procedures – 1 hour
    • Physical & Infrastructure security – 1 hour
    • HR Security – 1 hour
    • Legal & Ethical aspects – 1 hour (optional)
    • Security Auditing – 1 hour
    • Cryptography Algorithms – 1 hour (optional)
    • Symmetric Encryption & Message Confidentiality – 1 hour
    • Public-Key Cryptography & Message Authentication – 1 hour
    • Network Security – 1 hour
    • Internet Protocols & standards – 1 hour (optional)
    • Internet Authentication Applications – 1 hour (optional)
    • Wireless & Network Security – 1 hour


About the instructor

Image Description
4.87 Instructor rating
1,533 reviews
23,912 students
29 courses

Rup Sen

Technologist Leader. Experience- 20+ years.

.

Student feedback

Reviews

Image Description
April 3, 2019

Maria Kunis

  • Review rating
  • Review rating
  • Review rating
  • Review rating
  • Review rating

This course helped me in learning python in a very simple and effective way & boosts up my confidence. Concepts have been explained in a crystal clear way.

Was this helpful? Yes No Report