Cyber Security – Boot camp

Program DescriptionThe course focuses on the methodologies and practices the security concepts utilized by cyber security professionals. The course utilizes tools and techniques to educate students on cyber security and associated practices for securing networks and operating systems. Skill learned are evaluated through hands- on application of critical security concepts.
Learning Outcomes
  • Identify the key components of cybersecurity network architecture
  • Apply cybersecurity architecture principles
  • Identify security tools and hardening techniques
  • Analyze threats and risks within context of the cybersecurity architecture
  • Appraise cybersecurity incidents to Apply appropriate response
  • Evaluate decision making outcomes of cybersecurity scenarios
  • Access additional external resources to supplement knowledge of cybersecurity
Targeted Job Roles (not limited to:)Cyber security Analyst Cyber security Engineer
WeeksModules
1Module 1: Introduction to Cyber Security and Security Essentials
The Need for Cybersecurity
Physical security
Attacks, Concepts and Techniques
Protecting Your Data and Privacy
Protecting the Organization
Will Your Future Be in Cybersecurity?
Cybersecurity – A World of Experts and Criminals
The Cybersecurity Cube
Cybersecurity Threats, Vulnerabilities, and Attacks
The Art of Protecting Secrets, ensuring integrity and. Five nines concept
Protecting a Cybersecurity Domain and Becoming a Cybersecurity Specialist
2Module 2: Cyber Operations (CyberOps) Basics
Security Concepts
Security Monitoring
Host-Based Analysis

 

Network Intrusion Analysis
Security Policies and Procedures
Tools: Splunk, Syslog-ng, OSSEC, Graylog, Wireshark, tcpdump, Tshark, Snort, Bro, and Suricata
3Module 3: Computer Network and Security, Cryptography, IDAM, Data and Endpoint Security
Network architecture, protocols, and technologies: Layered architecture, Open Systems Interconnect (OSI) Model
Hybrid TCP/IP Model
Application Layer Protocols: HTTP, SNMP, DNS, POP, SMTP
Types of encryption carryon: DES, Triple DES, AES, IDEA, Blowfish, RC4, RC5, RC6, Asymmetric Cryptography, The Diffie-Hellman Algorithm, RSA
OWASP Top 10 web application vulnerabilities
Authorization, Authentication, Access Control, Privilege levels
Data Security Controls
Cloud Security
Identity, Entitlement, and Access Management
Virtualization
Security as a Service
Tools: OpenSSL, GnuPG, TrueCrypt, Nessus, Acunetix, Burp Suite, Kerberos,

RADIUS, TACACS+, LDAP, PGP, Symantec Endpoint Encryption, BitLocker, Cloudflare, AWS, Microsoft Azure, SailPoint, BeyondTrust, and Okta

4Module 4: CND Module
Secure IDS Configuration and Management
Secure VPN Configuration and Management
Network Traffic Monitoring and Analysis
Network Risk and Vulnerability Management
Data Backup and Recovery
Network Incident Response and Management
Overview of top 20 security controls
Tools: Snort, Suricata, OpenVPN, IPSEC, SSL VPNs, Wireshark, tcpdump, Tshark, Nessus, Qualys, OpenVAS, Rsync, Bacula, Amanda, OSSIM, AlienVault, Security Onion
5Module 5: CEH Module
Introduction to Ethical Hacking
Overview of current security Trends
Understanding the element of Information Security
Understanding Information Security Threats
Fee: Rs 7,499 + 18% GST
100% subsidized cost for Naveen Jindal Foundation registered students

or Click here to Register

Enquiry Form
close slider











    Please prove you are human by selecting the flag.