Cyber Security

With organizations having to secure an increasing amount of sensitive data, cyber security is becoming relevant and essential for businesses of all sizes. As the scale and scope of threats continue to rise at a fast pace, fresh opportunities are opening up for qualified data professionals in diverse sectors.

What is Cyber Security?

Cyber Security is the process and techniques involved in protecting sensitive data, computer systems, networks and software applications from cyber attacks. The cyber attacks are general terminology which covers a large number of topics, but some of the popular are:

  • Tampering systems and data stored within

  • Exploitation of resources

  • Unauthorized access to the targeted system and accessing sensitive information

  • Disrupting normal functioning of the business and its processes

  • Using ransomware attacks to encrypt data and extort money from victims

The Growing Challenge

The attacks are now becoming more innovative and sophisticated that is capable of disrupting the security and hacking the systems. So it’s very challenging for every business and security analyst to overcome this challenge and fight back with these attack.

About the course

Introduction

The purpose of this course is to equip one with the technologies involved in Cyber Security. The knowledge of these technologies helps in building an appreciation of possible threats, taking preventive measures and taking corrective actions when need be.

Course Coverage

  • Basic Concepts

  • Cryptography, Cryptographic Protocols & IPSec

  • OS Security - Access Control, Rootkit

  • Hacking (Ethical & Malicious)

  • DDOS & Ransomware

  • HTTP - DNS Filtering

  • Malware & Worms

  • Firewalls

  • Intrusion Detection & Prevention

  • OWASP10

  • Vulnerability Testing

  • API Security

  • SQL Injection & Cross site scripting

  • Incident Response Plan & Attack planning

  • Tools & Methods

a) Proxy Servers and Anonymizers.

b) Phishing.

c) Password Cracking.

d) Keyloggers and Spywares.

e) Virus and Worms

f) DoS and DDoS Attacks.

g) Attacks on Wireless Networks.

h) Identity Theft (ID Theft).

  • Understanding Computer Forensics

a) Cyber forensics and Digital Evidence.

b) Forensics Analysis of Email.

Next batch to be announced soon!