Cyber Security

by Slog Solutions Claim Listing

Cyber Security is the study of how the computer systems and networks can be protected from theft or damage to their hardware, software, or electronic data, and also the disruption of the services that they provide.

₹15000

Contact the Institutes

Fill this form

Advertisement

Slog Solutions Logo

img Duration

4 Weeks

Course Details

Cyber Security is the study of how the computer systems and networks can be protected from theft or damage to their hardware, software, or electronic data, and also the disruption of the services that they provide.

The study of Cyber Security plays an important role because the use of social media is in demand these days, and there should be control over the data that is shared by people.

The Cyber Security course teaches the students how to identify the computer system vulnerabilities, to recognize digital exploitation, and also prevent damage such as loss of data, and loss of money through viruses.

The individuals in the cybersecurity field are taught how to not only avoid cyber-attacks but also how to implement security measures to prevent such an attack preemptively and counterattack against a cyber threat.

 

Curriculum:

  • Week 1
  • Introduction to cybersecurity
  • Basic cybersecurity terminologies
  • Need for cybersecurity
  • Security auditing
  • Regulations and frameworks
  • Security architecture
  • Cybersecurity domains
  • CIA tried       
  • Networking Basics
  • Network security fundamentals
  • Switch, firewall, hub, topologies, SSH , telnet
  • Working with IP address
  • Week 2
  • Introduction to Linux
  • Linux distributions and installation
  • Command-line interface (CLI)
  • File system navigation and management
  • File and directory permissions
  • Managing local users and groups
  • System logs and analysis
  • Week 3
  • Ethical Hacking
  • What is ethical hacking?
  • Types of hackers
  • Phases of hacking
  • Foot-printing Active
  • Foot-printing Passive
  • In-depth Network Scanning
  • System Hacking Password Cracking
  • Enumeration User Identification
  • Trojan and Back doors
  • Viruses, Worms, malware
  • Week 4
  • Bots and Botnets
  • Social Engineering
  • Denial of Service DOS & DDOS Attacks,
  • Session Hijacking
  • Snopping and spoofing
  • Hacking web servers and server rooting
  • Firewall and IDS evaision
  • Honeypots, wireless network hacking
  • Buffer overflow
  • Breach attack simulation
  • Client-side hacking
  • Stegnography
  • Wireshark, tcpdump
  • Dehradun Branch

    Institution Of Engineers, Slog, 1st Floor, Near Isbt, Dehradun

Check out more Cybersecurity courses in India

HB Education Logo

Check Point Fire Wall Training

HB Educational Services provide excellent training for checkpoint firewall training in Chennai with placements. Our trainers are well experienced professionals working in MNC’s.

by HB Education [Claim Listing ]
SDLC (Skill Development Learning Centre) Logo

Cyber Security

This course provides an introduction to the field of Cyber Security, covering topics such as network security, cryptography, ethical hacking, and incident response. Students will learn essential skills to protect and defend against cyber threats.

by SDLC (Skill Development Learning Centre) [Claim Listing ]
Yo Insights Logo

Check Point Certified Security Administrator (CCSA)

Check Point Security Administration Training in Surat R77 provides an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades.

by Yo Insights [Claim Listing ]
Netech Bulls Logo

Cybersecurity Course

Welcome to Netech Bulls, your gateway to comprehensive cybersecurity education in Gurgaon. We offer a diverse range of programs to cater to various skill levels and career aspirations in the field of cybersecurity.

by Netech Bulls [Claim Listing ]
Britain International Academy Logo

Certified Security Analyst

Security is so critical to meet business objectives and following commanded insurances for secrecy, security experts are associated with all phases of IT advancement. They begin with the arranging and configuration, give assistance amid sending and advancement.

by Britain International Academy [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy