Advanced Cyber Security (An Application Approach)

by RIIT Education Claim Listing

Advanced Cyber Security course is offered by RIIT Education. Launched in 1999, RIIT continues to be one of Indias leading institutions of education and research in Information Technology.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

RIIT Education Logo

img Duration

Please Enquire

Course Details

Advanced Cyber Security course is offered by RIIT Education. Launched in 1999, RIIT continues to be one of Indias leading institutions of education and research in Information Technology. RIIT is focused on creating versatile IT professionals who can apply their knowledge & skills anywhere in the world.

The course syllabus will be delivered through a combination of eLearning resources, digital lectures, community based digital classrooms as applicable.

 

Syllabus:

  • Application Security
    • Importance of application security
    • Open Web Application Security Project (OWASP) top 10 web application vulnerabilities
    • Secure Software Development Life Cycle (SSDLC)
  • Data and Endpoint Security
    • Data security, data security controls
    • Endpoint security, host/endpoint security
  • Identity and Access Management (IAM)
    • Authorization, authentication
    • Access control, access control models
    • Privilege levels, IAM lifecycle, identity and access management process and activities
  • Phases of a Cyber Attack
    • Reconnaissance: adversary identifies and selects a target
    • Weaponize: adversary packages an exploit into a payload designed to execute on the targeted computer/network
    • Deliver: adversary delivers the payload to the target system
    • Exploit: adversary code is executed on the target system
    • Install: adversary installs remote access software that provides a persistent presence within the target environment system
    • Command and control: adversary employs remote access mechanisms to establish a command and control channel with the compromised device
    • Act on objectives: adversary pursues intended objectives such as data exfiltration, lateral movement to other targets
  • Security Processes in Practice for Businesses
    • Key security business processes
    • Corporate security governance
    • IT strategy management
    • Portfolio, program, project management
    • Change management
    • Supplier (third-party management)
    • Problem management
    • Knowledge management
    • Information security management
    • Business Continuity Planning (BCP)
    • IT operations management
    • Overview of top 20 security controls
  • Information Security Standards
    • Information security standards - need
    • ISO/IEC 27000 standard series
    • ISO/IEC 27001
    • ISO/IEC 27002
    • ISO/IEC 27005
    • ISO/IEC 27006
    • SP 800 standard series
    • SP 800 -12
    • Standard of Good Practice (SoGP)
    • Control Objectives for Information and Related Technology (COBIT)
    • BSI IT-Grundschutz baseline protection
    • BSI Standard 100-1
    • BSI Standard 100-2
    • BSI Standard 100-3

 

  • Ranchi Branch

    2nd Floor, Paras Complex, Circular Road, Ranchi

Check out more Cybersecurity courses in India

IONX (Institute Of Network Experts) Logo

Network Security Architect Professional

Professionals in network security architecture are specialists committed to securing digital systems. They evaluate the risks, create and put into place security measures, and keep an eye out for weaknesses in network activity.

by IONX (Institute Of Network Experts) [Claim Listing ]
Skillanto Logo

Cyber Security

This program is geared towards generating and enhancing awareness about cybersecurity challenges and the concepts of cybersecurity and cyber ethics among the stakeholders to help them become responsible cyber citizens and participate safely.

by Skillanto [Claim Listing ]
  • Price
  • Start Date
  • Duration
InfosecTrain Logo

CCSP Training & Certification Course

This certification-focused CCSP course is designed to empower learners with all necessary skills and expertise to ace the CCSP certification. The key objective of this CCSP certification training program is to arm learners with the right techniques and skills required to safeguard the critical data...

by InfosecTrain [Claim Listing ]
AWT Education (Abstract Web Technologies) Logo

Cyber Security

Cyber Security course is offered by AWT Education (Abstract Web Technologies). AWT Computer Institute is the best computer education institute in Bhubaneswar, ICI is committed to providing students with the latest technologies and expertise to prepare them for a successful career.

by AWT Education (Abstract Web Technologies) [Claim Listing ]
Zoc Learnings Logo

Certified Chief Information Security Officer (CCISO)

The Certified Chief Information Security Officer (CCISO) course is designed to help IT professionals expand their knowledge and develop the skills to become successful Chief Information Security Officer (CISO).

by Zoc Learnings

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy