

Cyber Security – Boot camp
| Program Description | The course focuses on the methodologies and practices the security concepts utilized by cyber security professionals. The course utilizes tools and techniques to educate students on cyber security and associated practices for securing networks and operating systems. Skill learned are evaluated through hands- on application of critical security concepts. |
| Learning Outcomes |
|
| Targeted Job Roles (not limited to:) | Cyber security Analyst Cyber security Engineer |
| Weeks | Modules |
| 1 | Module 1: Introduction to Cyber Security and Security Essentials |
| The Need for Cybersecurity | |
| Physical security | |
| Attacks, Concepts and Techniques | |
| Protecting Your Data and Privacy | |
| Protecting the Organization | |
| Will Your Future Be in Cybersecurity? | |
| Cybersecurity – A World of Experts and Criminals | |
| The Cybersecurity Cube | |
| Cybersecurity Threats, Vulnerabilities, and Attacks | |
| The Art of Protecting Secrets, ensuring integrity and. Five nines concept | |
| Protecting a Cybersecurity Domain and Becoming a Cybersecurity Specialist | |
| 2 | Module 2: Cyber Operations (CyberOps) Basics |
| Security Concepts | |
| Security Monitoring | |
| Host-Based Analysis |
| Network Intrusion Analysis | |
| Security Policies and Procedures | |
| Tools: Splunk, Syslog-ng, OSSEC, Graylog, Wireshark, tcpdump, Tshark, Snort, Bro, and Suricata | |
| 3 | Module 3: Computer Network and Security, Cryptography, IDAM, Data and Endpoint Security |
| Network architecture, protocols, and technologies: Layered architecture, Open Systems Interconnect (OSI) Model | |
| Hybrid TCP/IP Model | |
| Application Layer Protocols: HTTP, SNMP, DNS, POP, SMTP | |
| Types of encryption carryon: DES, Triple DES, AES, IDEA, Blowfish, RC4, RC5, RC6, Asymmetric Cryptography, The Diffie-Hellman Algorithm, RSA | |
| OWASP Top 10 web application vulnerabilities | |
| Authorization, Authentication, Access Control, Privilege levels | |
| Data Security Controls | |
| Cloud Security | |
| Identity, Entitlement, and Access Management | |
| Virtualization | |
| Security as a Service | |
| Tools: OpenSSL, GnuPG, TrueCrypt, Nessus, Acunetix, Burp Suite, Kerberos, RADIUS, TACACS+, LDAP, PGP, Symantec Endpoint Encryption, BitLocker, Cloudflare, AWS, Microsoft Azure, SailPoint, BeyondTrust, and Okta | |
| 4 | Module 4: CND Module |
| Secure IDS Configuration and Management | |
| Secure VPN Configuration and Management | |
| Network Traffic Monitoring and Analysis | |
| Network Risk and Vulnerability Management | |
| Data Backup and Recovery | |
| Network Incident Response and Management | |
| Overview of top 20 security controls | |
| Tools: Snort, Suricata, OpenVPN, IPSEC, SSL VPNs, Wireshark, tcpdump, Tshark, Nessus, Qualys, OpenVAS, Rsync, Bacula, Amanda, OSSIM, AlienVault, Security Onion | |
| 5 | Module 5: CEH Module |
| Introduction to Ethical Hacking | |
| Overview of current security Trends | |
| Understanding the element of Information Security | |
| Understanding Information Security Threats |
Fee: Rs 7,499 + 18% GST
100% subsidized cost for Naveen Jindal Foundation registered students
100% subsidized cost for Naveen Jindal Foundation registered students



