

Cyber Security – Boot camp
Program Description
The course focuses on the methodologies and practices the security concepts utilized by cyber security professionals. The course utilizes tools and techniques to educate students on cyber security and associated practices for securing networks and operating systems. Skill learned are evaluated through hands-on application of critical security concepts.
Learning Outcomes
- Identify the key components of cybersecurity network architecture
- Apply cybersecurity architecture principles
- Identify security tools and hardening techniques
- Analyze threats and risks within context of the cybersecurity architecture
- Appraise cybersecurity incidents to apply appropriate response
- Evaluate decision-making outcomes of cybersecurity scenarios
- Access additional external resources to supplement knowledge of cybersecurity
Targeted Job Roles (not limited to:)
Cyber Security Analyst
Cyber Security Engineer
Week 1
Module 1: Introduction to Cyber Security and Security Essentials
- The Need for Cybersecurity
- Physical Security
- Attacks, Concepts and Techniques
- Protecting Your Data and Privacy
- Protecting the Organization
- Will Your Future Be in Cybersecurity?
- Cybersecurity – A World of Experts and Criminals
- The Cybersecurity Cube
- Cybersecurity Threats, Vulnerabilities, and Attacks
- The Art of Protecting Secrets, Ensuring Integrity and Five Nines Concept
- Protecting a Cybersecurity Domain and Becoming a Cybersecurity Specialist
Week 2
Module 2: Cyber Operations (CyberOps) Basics
- Security Concepts
- Security Monitoring
- Host-Based Analysis
- Network Intrusion Analysis
- Security Policies and Procedures
Tools: Splunk, Syslog-ng, OSSEC, Graylog, Wireshark, tcpdump, Tshark, Snort, Bro, and Suricata
Week 3
Module 3: Computer Network and Security, Cryptography, IDAM, Data and Endpoint Security
- Network Architecture, Protocols, and Technologies: Layered Architecture, Open Systems Interconnect (OSI) Model
- Hybrid TCP/IP Model
- Application Layer Protocols: HTTP, SNMP, DNS, POP, SMTP
- Types of Encryption: DES, Triple DES, AES, IDEA, Blowfish, RC4, RC5, RC6, Asymmetric Cryptography, Diffie-Hellman Algorithm, RSA
- OWASP Top 10 Web Application Vulnerabilities
- Authorization, Authentication, Access Control, Privilege Levels
- Data Security Controls
- Cloud Security
- Identity, Entitlement, and Access Management
- Virtualization
- Security as a Service
Tools: OpenSSL, GnuPG, TrueCrypt, Nessus, Acunetix, Burp Suite, Kerberos, RADIUS, TACACS+, LDAP, PGP, Symantec Endpoint Encryption, BitLocker, Cloudflare, AWS, Microsoft Azure, SailPoint, BeyondTrust, and Okta
Week 4
Module 4: CND Module
- Secure IDS Configuration and Management
- Secure VPN Configuration and Management
- Network Traffic Monitoring and Analysis
- Network Risk and Vulnerability Management
- Data Backup and Recovery
- Network Incident Response and Management
- Overview of Top 20 Security Controls
Tools: Snort, Suricata, OpenVPN, IPSEC, SSL VPNs, Wireshark, tcpdump, Tshark, Nessus, Qualys, OpenVAS, Rsync, Bacula, Amanda, OSSIM, AlienVault, Security Onion
Week 5
Module 5: CEH Module
- Introduction to Ethical Hacking
- Overview of Current Security Trends
- Understanding the Elements of Information Security
- Understanding Information Security Threats
Fee: Rs 22,499 + 18% GST



