Cyber Security

by Slog Solutions Claim Listing

Cyber Security is the study of how the computer systems and networks can be protected from theft or damage to their hardware, software, or electronic data, and also the disruption of the services that they provide.

£15000

Contact the Institutes

Fill this form

Advertisement

Slog Solutions Logo

img Duration

4 Weeks

Course Details

Cyber Security is the study of how the computer systems and networks can be protected from theft or damage to their hardware, software, or electronic data, and also the disruption of the services that they provide.

The study of Cyber Security plays an important role because the use of social media is in demand these days, and there should be control over the data that is shared by people.

The Cyber Security course teaches the students how to identify the computer system vulnerabilities, to recognize digital exploitation, and also prevent damage such as loss of data, and loss of money through viruses.

The individuals in the cybersecurity field are taught how to not only avoid cyber-attacks but also how to implement security measures to prevent such an attack preemptively and counterattack against a cyber threat.

 

Curriculum:

  • Week 1
  • Introduction to cybersecurity
  • Basic cybersecurity terminologies
  • Need for cybersecurity
  • Security auditing
  • Regulations and frameworks
  • Security architecture
  • Cybersecurity domains
  • CIA tried       
  • Networking Basics
  • Network security fundamentals
  • Switch, firewall, hub, topologies, SSH , telnet
  • Working with IP address
  • Week 2
  • Introduction to Linux
  • Linux distributions and installation
  • Command-line interface (CLI)
  • File system navigation and management
  • File and directory permissions
  • Managing local users and groups
  • System logs and analysis
  • Week 3
  • Ethical Hacking
  • What is ethical hacking?
  • Types of hackers
  • Phases of hacking
  • Foot-printing Active
  • Foot-printing Passive
  • In-depth Network Scanning
  • System Hacking Password Cracking
  • Enumeration User Identification
  • Trojan and Back doors
  • Viruses, Worms, malware
  • Week 4
  • Bots and Botnets
  • Social Engineering
  • Denial of Service DOS & DDOS Attacks,
  • Session Hijacking
  • Snopping and spoofing
  • Hacking web servers and server rooting
  • Firewall and IDS evaision
  • Honeypots, wireless network hacking
  • Buffer overflow
  • Breach attack simulation
  • Client-side hacking
  • Stegnography
  • Wireshark, tcpdump
  • Dehradun Branch

    Institution Of Engineers, Slog, 1st Floor, Near Isbt, Dehradun

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy