Cyber Security Course
- Offered byApponix Academy
Cyber Security Course at Apponix Academy Overview
Duration | 2 months |
Mode of learning | Online |
Credential | Certificate |
Cyber Security Course at Apponix Academy Highlights
- 70 Hrs Practical Learning
- Mini Android App Projects
- Assured Job Placement
- Resume Preparation
- Interview Preparation
- Guaranteed 3 Interview Arrangements
- Delivered by Senior Android Developer
- Linkedin Learning Premium access for 12 months
- Certificate from JainX Academy - Unit of Jain University
Cyber Security Course at Apponix Academy Course details
- This course is ideal for freshers and professionals who want to learn and start career in cyber security & ethical hacking domain.
- With this cyber security training, student will be able to gauge and stop cyber threats using all the latest tools and procedures.
- Furthermore, the syllabus for the cyber security course covers the basics as well as the advanced level cyber security & ethical hacking aspects thus ensuring that even if the student do not have any experience in the sector, they can learn from scratch and become job-ready in no time.
- Understand the principles of Cyber security
- Security essentials, Cryptography, Computer Networks
- Preparing for US-Council & EC-Council Certifications
- Wireless Hacking Techniques and Hacking Tools
- SQL injection attack techniques
- Session hijacking techniques
- Firewall, Web application firewall, IDS, IPS and Honeypots
- web application scanning
- Conducting Network scanning
- Sniffing network traffic
- Cryptography Concepts, Encryption Algorithms
- Access to job assistance, internship support, and curated curriculum. The course is available via classroom as well as online learning modes.
Cyber Security Course at Apponix Academy Curriculum
Introduction to Cybersecurity
CIA Triad, Separation of Duties, Org Structure, Top Down and Bottom-up approach
Information Availability
Recovery Time Objective/Recovery Point Objective/Maximum Tolerable Downtime, SLA
Disclosure, Alteration and Destruction of Data
Disclosure, Alteration and Destruction of Data
IAAAAProtocols
Identification, Authentication, Authorization, Accountability and Auditing
Corporate Governance and Plans
Introduction to corporate Governance, Strategic, Tactical and Operational Plans, Policies, Standards, Procedures and Guidelines
Data Protection Mechanism
Data Layering, Abstraction, Data Hiding, Encryption
Data Classification methodologies
Confidential, Sensitive, Top Secret, Private, Public, Unclassified
Risk management
Asset Management, Threat and Vulnerability, Threat, Threat Agent, Exploit, Quantitative and Qualitative Risk Assessment
Risk management lifecycle
Assessment, Analysis, Mitigation and Response
Risk management frameworks
ISO27001, ISO31000, ISO27000, Steps involved in risk management framework
Internals Controls
Preventive, Detective and Corrective controls
Threat Identification Model
STRIDE
DREAD
Disaster Recovery and business continuity management
Contingency Plans, BCP documentation and DR documentation, Types of tests
Information system laws
Criminal, Civil and Administrative laws, Computer Security Act, Computer Fraud and Abuse Act, Government Information Security Reform Act, Federal Information Security Management Act
Information system regulations
PCI-DSS, GDPR, HIPAA, Hi-Trust, SOX, ISO series etc.
Intellectual property
Copyright, Trademark, Patents, Trade Secrets
Data security controls and data ownership
Data in Use, Data in Rest, Data in Transit, Data Custodian, Data Processor, Data Controller, System owners, Administrators, End Users
Data destruction mechanism
Sanitize, Degaussing, Erase, Overwrite
Security architecture framework and security models
Zachman Framework, Sherwood Applied Business Security Architecture (SABSA), Information Technology Infrastructure Library (ITIL), State Machine Models, Multilevel Lattice Models, Information Flow Models
Mobile security
Device Encryption
Remote wiping
Remote lock out
Internal locks (voice, face recognition, pattern, pin, password)
Application installation control
Asset tracking (IMIE)
Mobile Device Management
Removable storage (SD CARD, Micro SD etc.)
IoT and Internet security
Network Segmentation (Isolation)
Logical Isolation(VLAN)
Physical isolation (Network segments)
Application firewalls
Firmware updates
Physical security
Various threats to Physical Security
System virtualization
Guest OS, Virtualization Threats, Cloud Computing Models, Cloud Computing Threats
Web security
OWASP, OWASP Top 10, SQL Injection, XSS, CSRF
Cryptography
Goals of Cryptography, Symmetric and Asymmetric Encryption, Decryption, Digital Signature, Hashing, Cryptography Algorithms (DES, AES, IDEA, two fish)
Network Security
OSI Model, Attacks in OSI Layers, Network Types, Network Methods and Standards, Hardware devices, VPN protocols,
Firewall and Parameter security
Firewall, Types of Firewalls, DMZ, Honey Pot, Honey Net
Different types of network attacks
Virus, Worms, Logic Bomb, Trojan, Backdoor, Sniffing, Zero Day attack, Ransomware, Rootkit, Spyware, DoS, DDos, Botnet etc.
Email Security
LDAP,SASL,S/MIME
Identity and access management
3 factor authentication, SSO, Authorization, Federated Identity, Access Control Models, Access Control Categories, Access control types
Vulnerability assessment and pen test
Steps involved, Test Types, Test Strategies, Reporting
Software Development and testing
Development Models, Development lifecycle, Testing types, Code review and testing
Security Operations and Incident management
Evidence Life Cycle, IDS, IPS, Backup, SIEM, Hardening Process
Threat hunting and attack framework
Cyber Kill Chain Process, Mitre Attack framework, Threat Hunting benefits
Social Engineering Attack
Phishing, Spear Phishing, Whaling, Piggybacking, Watering Hole
Assessment and Knowledge test
Assessment and Knowledge test
Viva and Interview preparation
Viva and Interview preparation
Other courses offered by Apponix Academy
Cyber Security Course at Apponix Academy Students Ratings & Reviews
- 3-41