Advanced Cyber Security (An Application Approach)

by RIIT Education Claim Listing

Advanced Cyber Security course is offered by RIIT Education. Launched in 1999, RIIT continues to be one of Indias leading institutions of education and research in Information Technology.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

RIIT Education Logo

img Duration

Please Enquire

Course Details

Advanced Cyber Security course is offered by RIIT Education. Launched in 1999, RIIT continues to be one of Indias leading institutions of education and research in Information Technology. RIIT is focused on creating versatile IT professionals who can apply their knowledge & skills anywhere in the world.

The course syllabus will be delivered through a combination of eLearning resources, digital lectures, community based digital classrooms as applicable.

 

Syllabus:

  • Application Security
    • Importance of application security
    • Open Web Application Security Project (OWASP) top 10 web application vulnerabilities
    • Secure Software Development Life Cycle (SSDLC)
  • Data and Endpoint Security
    • Data security, data security controls
    • Endpoint security, host/endpoint security
  • Identity and Access Management (IAM)
    • Authorization, authentication
    • Access control, access control models
    • Privilege levels, IAM lifecycle, identity and access management process and activities
  • Phases of a Cyber Attack
    • Reconnaissance: adversary identifies and selects a target
    • Weaponize: adversary packages an exploit into a payload designed to execute on the targeted computer/network
    • Deliver: adversary delivers the payload to the target system
    • Exploit: adversary code is executed on the target system
    • Install: adversary installs remote access software that provides a persistent presence within the target environment system
    • Command and control: adversary employs remote access mechanisms to establish a command and control channel with the compromised device
    • Act on objectives: adversary pursues intended objectives such as data exfiltration, lateral movement to other targets
  • Security Processes in Practice for Businesses
    • Key security business processes
    • Corporate security governance
    • IT strategy management
    • Portfolio, program, project management
    • Change management
    • Supplier (third-party management)
    • Problem management
    • Knowledge management
    • Information security management
    • Business Continuity Planning (BCP)
    • IT operations management
    • Overview of top 20 security controls
  • Information Security Standards
    • Information security standards - need
    • ISO/IEC 27000 standard series
    • ISO/IEC 27001
    • ISO/IEC 27002
    • ISO/IEC 27005
    • ISO/IEC 27006
    • SP 800 standard series
    • SP 800 -12
    • Standard of Good Practice (SoGP)
    • Control Objectives for Information and Related Technology (COBIT)
    • BSI IT-Grundschutz baseline protection
    • BSI Standard 100-1
    • BSI Standard 100-2
    • BSI Standard 100-3

 

  • Ranchi Branch

    2nd Floor, Paras Complex, Circular Road, Ranchi

Check out more Cybersecurity courses in India

Institute of Advance Network Technology Logo

Cyber Secure User

Star Cyber Secure User is a global awareness certification program curated to create, enhance and sustain awareness about the rising threats in the information or cyber world.

by Institute of Advance Network Technology [Claim Listing ]
NITS Global Logo

Checkpoint Certification CCSA Training Course

Welcome to NITS Global, your premier destination for CCSA Checkpoint training in Pune. As the digital landscape evolves, cybersecurity becomes paramount, and the CCSA certification ensures you have the skills to safeguard networks effectively.

by NITS Global [Claim Listing ]
Axximum Infosolutions Logo

CISM

The Certified Information Security Manager – CISM certification confirms your capability to oversee an organization’s information security program. It encompasses information security governance, risk management, incident management, and other areas.

by Axximum Infosolutions [Claim Listing ]
Yo Insights Logo

Check Point Certified Security Administrator (CCSA)

Check Point Security Administration Training in Surat R77 provides an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.

by Yo Insights [Claim Listing ]
P2G tecch Logo

CCSE

For network and security administrators who have in-depth skills and expertise in managing and supporting Check Point products. Proficiencies include configuring and managing VPN-1/FireWall-1 as an Internet security solution and virtual private network (VPN).

by P2G tecch [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy