Advanced Cyber Security (An Application Approach)

by RIIT Education Claim Listing

Advanced Cyber Security course is offered by RIIT Education. Launched in 1999, RIIT continues to be one of Indias leading institutions of education and research in Information Technology.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

RIIT Education Logo

img Duration

Please Enquire

Course Details

Advanced Cyber Security course is offered by RIIT Education. Launched in 1999, RIIT continues to be one of Indias leading institutions of education and research in Information Technology. RIIT is focused on creating versatile IT professionals who can apply their knowledge & skills anywhere in the world.

The course syllabus will be delivered through a combination of eLearning resources, digital lectures, community based digital classrooms as applicable.

 

Syllabus:

  • Application Security
    • Importance of application security
    • Open Web Application Security Project (OWASP) top 10 web application vulnerabilities
    • Secure Software Development Life Cycle (SSDLC)
  • Data and Endpoint Security
    • Data security, data security controls
    • Endpoint security, host/endpoint security
  • Identity and Access Management (IAM)
    • Authorization, authentication
    • Access control, access control models
    • Privilege levels, IAM lifecycle, identity and access management process and activities
  • Phases of a Cyber Attack
    • Reconnaissance: adversary identifies and selects a target
    • Weaponize: adversary packages an exploit into a payload designed to execute on the targeted computer/network
    • Deliver: adversary delivers the payload to the target system
    • Exploit: adversary code is executed on the target system
    • Install: adversary installs remote access software that provides a persistent presence within the target environment system
    • Command and control: adversary employs remote access mechanisms to establish a command and control channel with the compromised device
    • Act on objectives: adversary pursues intended objectives such as data exfiltration, lateral movement to other targets
  • Security Processes in Practice for Businesses
    • Key security business processes
    • Corporate security governance
    • IT strategy management
    • Portfolio, program, project management
    • Change management
    • Supplier (third-party management)
    • Problem management
    • Knowledge management
    • Information security management
    • Business Continuity Planning (BCP)
    • IT operations management
    • Overview of top 20 security controls
  • Information Security Standards
    • Information security standards - need
    • ISO/IEC 27000 standard series
    • ISO/IEC 27001
    • ISO/IEC 27002
    • ISO/IEC 27005
    • ISO/IEC 27006
    • SP 800 standard series
    • SP 800 -12
    • Standard of Good Practice (SoGP)
    • Control Objectives for Information and Related Technology (COBIT)
    • BSI IT-Grundschutz baseline protection
    • BSI Standard 100-1
    • BSI Standard 100-2
    • BSI Standard 100-3

 

  • Ranchi Branch

    2nd Floor, Paras Complex, Circular Road, Ranchi

Check out more Cybersecurity courses in India

The MSP Training Logo

CCSP Certified Cloud Security Professional

Certified Cloud Security Professional course provides in-depth knowledge to the delegates about the information security risks and mitigation strategies. The CCSP course provides complete understanding to the delegates about the cloud software assurance and validation.

by The MSP Training [Claim Listing ]
Codec Networks Logo

Certified Information Security Manager - CISM Training & Certification

Certified Information Security Manager (CISM) is a registered trademark and course developed by ISACA and the most globally recognized certification among information security management professionals craft skills to effective security management and consulting services.

by Codec Networks [Claim Listing ]
JALS Network & Technology Logo

Cyber Security Analyst (CSA)

Protecting sensitive data and securing network systems are crucial in today's digital world. With the increasing number of cyber threats, the demand for skilled cybersecurity professionals is growing day by day.

by JALS Network & Technology [Claim Listing ]
FireShark Logo

Checkpoint Certified Security Administrator (CCSA)

Checkpoint Certified Security Administrator (CCSA) course is offered by FireShark. FireShark has highly skilled, certified, and experienced trainers that only give the finest in the industry. we also provide high levels of technical instruction and services to our students and clients.

by FireShark [Claim Listing ]
Nux Software Solutions Logo

Certified Information Security Manager (CISM)

Best Certified Information Security Manager (CISM) cloud architect Training Institute in Coimbatore BestCertified Information Security Manager (CISM) training courses classes deliver by Nux software solutions in coimbatore.

by Nux Software Solutions [Claim Listing ]

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy