- The need for Cyber Security
- CIA Triad
- Vulnerability, Threat, and Risk
- Risk Governance & Risk Management
- Security Architecture
- Security Governance
- Security Auditing
- Compliance
- Computer Security Architecture & Design
- Quiz Module 1
- Home
- Henry Harvin
- Courses
- Certified Cyber Security Professional
Online
16 Hours
₹ 129,500
Quick facts
particular | details | ||
---|---|---|---|
Medium of instructions
English
|
Mode of learning
Self study, Virtual Classroom
|
Mode of Delivery
Video and Text Based
|
Frequency of Classes
Weekends
|
Course and certificate fees
Fees information
₹ 129,500
certificate availability
Yes
certificate providing authority
Henry Harvin
The syllabus
Module 1 : Security Essentials
Module 2 : Cryptography
- Background of Cryptography
- Symmetric Cryptography
- Data Encryption Standard (DES)
- Triple-DES
- The Advanced Encryption Standard (AES)
- International Data Encryption Algorithm (IDEA)
- Blowfish
- RC4
- RC5
- Digital Certificate life cycle (Initialize, Issue, Cancel)
- Certificate Authority, Certificate Repository, Certificate Revocation lists
- Digital Certificates and its Format (X.509, X.500)
- Attacks against Encrypted Data
- Cryptographic Hash Functions
- Elliptic Curve Cryptosystems (ECC)
- RSA
- The Diffie-Hellman Algorithm
- Asymmetric Cryptography
- RC6
- Quiz Module 2
Module 3: Computer Network & Security
- Network Architecture, Protocols and Technologies:
- Layered Architecture, Open Systems Interconnect (OSI) Model
- Transmission Control Protocol / Internet Protocol (TCP/IP)
- Hybrid TCP/IP Model
- Application Layer Protocols: HTTP, SNMP, DNS, POP, SMTP
- Transport layer protocols: Transmission Control Protocol (TCP), User Datagram Protocol (UDP)
- Network/Internet layer protocols:
- Internet Protocol (IP) v4, IPv6, IPsec protocols
- Link-layer protocols: Address
- Resolution Protocol (ARP) / Reverse ARP / Proxy ARP, Ethernet, VLAN
- Quiz Module 3
Module 4: Application Security
- SSDLC (Secure Software Development Life Cycle)
- Quiz Module 4
Module 5: Data & Endpoint Security
- Data Security
- Data Security Controls
- Host/ Endpoint Security Controls
- Quiz Module 5
Module 6: IdAM (Identify & Access Management)
- Authorization
- Authentication
- Access Control
- Privilege levels
- Identity & Access Management Process and activities (Role-Based, Single Sign-on)
- Quiz Module 6
Module 7: Cloud Security
- Cloud Computing Architectural Framework
- Concerns & Best Practices
- Governance and Enterprise Risk Management
- Legal Issues: Contracts and Electronic Discovery
- Compliance and Audit Management
- Information Management and Data Security
- Interoperability and Portability
- Traditional Security, Business Continuity, and Disaster Recovery
- Data Centre Operations
- Incident Response
- Application Security
- Encryption and Key Management
- Identity, Entitlement, and Access Management
- Virtualization
- Security as a Service
- Quiz Module 7
Module 8: Phases of a Cyber Attack
- Phase 1 —Reconnaissance: Adversary identifies and selects a Target
- Phase 2 —Weaponize: Adversary packages an exploit into a payload designed to execute on the targeted computer/network
- Phase 3 —Deliver: The adversary delivers the payload to the target system
- Phase 4 —Exploit: Adversary code is executed on the target system
- Phase 5 —Install: Adversary installs remote access software
- that provides a persistent presence within the targeted environment or system
- Phase 6 —Command and Control: Adversary employs remote access
- mechanisms to establish a command and control channel with the compromised device
- Phase 7 —Act on Objectives: Adversary pursues intended objectives e.g., data exfiltration, lateral movement to other targets
- Quiz Module 8
Module 9: Security Processes in practice for Businesses
- Key Security Business Processes
- Corp. & Security Governance
- IT Strategy management
- Portfolio/Program/Project management
- Change management
- Supplier (third party) management
- Problem management
- Knowledge management
- Info-sec management
- BCP
- IT Operations management
- Overview of top 20 security controls
- Quiz Module 9
Complimentary Module 1: Soft Skills Development
- Business Communication
- Preparation for the Interview
- Presentation Skills
Complimentary Module 2: Resume Writing
- Resume Building Technique