Cyber Security

by Slog Solutions Claim Listing

Cyber Security is the study of how the computer systems and networks can be protected from theft or damage to their hardware, software, or electronic data, and also the disruption of the services that they provide.

₹15000

Contact the Institutes

Fill this form

Advertisement

Slog Solutions Logo

img Duration

4 Weeks

Course Details

Cyber Security is the study of how the computer systems and networks can be protected from theft or damage to their hardware, software, or electronic data, and also the disruption of the services that they provide.

The study of Cyber Security plays an important role because the use of social media is in demand these days, and there should be control over the data that is shared by people.

The Cyber Security course teaches the students how to identify the computer system vulnerabilities, to recognize digital exploitation, and also prevent damage such as loss of data, and loss of money through viruses.

The individuals in the cybersecurity field are taught how to not only avoid cyber-attacks but also how to implement security measures to prevent such an attack preemptively and counterattack against a cyber threat.

 

Curriculum:

  • Week 1
  • Introduction to cybersecurity
  • Basic cybersecurity terminologies
  • Need for cybersecurity
  • Security auditing
  • Regulations and frameworks
  • Security architecture
  • Cybersecurity domains
  • CIA tried       
  • Networking Basics
  • Network security fundamentals
  • Switch, firewall, hub, topologies, SSH , telnet
  • Working with IP address
  • Week 2
  • Introduction to Linux
  • Linux distributions and installation
  • Command-line interface (CLI)
  • File system navigation and management
  • File and directory permissions
  • Managing local users and groups
  • System logs and analysis
  • Week 3
  • Ethical Hacking
  • What is ethical hacking?
  • Types of hackers
  • Phases of hacking
  • Foot-printing Active
  • Foot-printing Passive
  • In-depth Network Scanning
  • System Hacking Password Cracking
  • Enumeration User Identification
  • Trojan and Back doors
  • Viruses, Worms, malware
  • Week 4
  • Bots and Botnets
  • Social Engineering
  • Denial of Service DOS & DDOS Attacks,
  • Session Hijacking
  • Snopping and spoofing
  • Hacking web servers and server rooting
  • Firewall and IDS evaision
  • Honeypots, wireless network hacking
  • Buffer overflow
  • Breach attack simulation
  • Client-side hacking
  • Stegnography
  • Wireshark, tcpdump
  • Dehradun Branch

    Institution Of Engineers, Slog, 1st Floor, Near Isbt, Dehradun

Check out more Cybersecurity courses in India

Institute for Technical Education Logo

Network And Security Associate (Information Security)

CNSA Course is a set of strategies for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information.

by Institute for Technical Education [Claim Listing ]
Routing Switching Tigers Logo

Computer Hacking Forensic Investigator

CHFI investigators will possess necessary skills to excel in incident handling and investigate various types of security incidents such as data breaches, latest persistent security issues, insider employee threats and intricate digital forensic circumstances and cases.

by Routing Switching Tigers [Claim Listing ]
  • Price
  • Start Date
  • Duration
Softpro Learning Center Logo

Cyber Security Training

Softpro India Cyber Security course will help you learn various concepts such as ethical hacking, cryptography, computer networks & security, application security, idAM (identity & access management), vulnerability analysis, malware threats, sniffing and more.

by Softpro Learning Center [Claim Listing ]
Berry Infotech Logo

Certified Information Security Manager Certification And Training

The course is aligned with ISACA best practices and is designed to help you pass the CISM exam on your first attempt. Enterprises and government agencies increasingly expect their IT professionals to hold a CISM certification.

by Berry Infotech [Claim Listing ]
CADD Centre Kannur Logo

Network Security

Networks can be private, such as within a company, and others that might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions.

by CADD Centre Kannur [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy