Apponix Academy
Apponix Academy Logo

Cyber Security Course 

  • Offered byApponix Academy

Cyber Security Course
 at 
Apponix Academy 
Overview

Duration

2 months

Mode of learning

Online

Credential

Certificate

Cyber Security Course
 at 
Apponix Academy 
Highlights

  • 70 Hrs Practical Learning
  • Mini Android App Projects
  • Assured Job Placement
  • Resume Preparation
  • Interview Preparation
  • Guaranteed 3 Interview Arrangements
  • Delivered by Senior Android Developer
  • Linkedin Learning Premium access for 12 months
  • Certificate from JainX Academy - Unit of Jain University
Read more
Details Icon

Cyber Security Course
 at 
Apponix Academy 
Course details

Who should do this course?
  • This course is ideal for freshers and professionals who want to learn and start career in cyber security & ethical hacking domain.
  • With this cyber security training, student will be able to gauge and stop cyber threats using all the latest tools and procedures.
  • Furthermore, the syllabus for the cyber security course covers the basics as well as the advanced level cyber security & ethical hacking aspects thus ensuring that even if the student do not have any experience in the sector, they can learn from scratch and become job-ready in no time.
What are the course deliverables?
  • Understand the principles of Cyber security
  • Security essentials, Cryptography, Computer Networks
  • Preparing for US-Council & EC-Council Certifications
  • Wireless Hacking Techniques and Hacking Tools
  • SQL injection attack techniques
  • Session hijacking techniques
  • Firewall, Web application firewall, IDS, IPS and Honeypots
  • web application scanning
  • Conducting Network scanning
  • Sniffing network traffic
  • Cryptography Concepts, Encryption Algorithms
More about this course
  • Access to job assistance, internship support, and curated curriculum. The course is available via classroom as well as online learning modes.

Cyber Security Course
 at 
Apponix Academy 
Curriculum

Introduction to Cybersecurity

CIA Triad, Separation of Duties, Org Structure, Top Down and Bottom-up approach

Information Availability

Recovery Time Objective/Recovery Point Objective/Maximum Tolerable Downtime, SLA

Disclosure, Alteration and Destruction of Data

Disclosure, Alteration and Destruction of Data

IAAAAProtocols

Identification, Authentication, Authorization, Accountability and Auditing

Corporate Governance and Plans

Introduction to corporate Governance, Strategic, Tactical and Operational Plans, Policies, Standards, Procedures and Guidelines

Data Protection Mechanism

Data Layering, Abstraction, Data Hiding, Encryption

Data Classification methodologies

Confidential, Sensitive, Top Secret, Private, Public, Unclassified

Risk management

Asset Management, Threat and Vulnerability, Threat, Threat Agent, Exploit, Quantitative and Qualitative Risk Assessment

Risk management lifecycle

Assessment, Analysis, Mitigation and Response

Risk management frameworks

ISO27001, ISO31000, ISO27000, Steps involved in risk management framework

Internals Controls

Preventive, Detective and Corrective controls

Threat Identification Model

STRIDE

DREAD

Disaster Recovery and business continuity management

Contingency Plans, BCP documentation and DR documentation, Types of tests

Information system laws

Criminal, Civil and Administrative laws, Computer Security Act, Computer Fraud and Abuse Act, Government Information Security Reform Act, Federal Information Security Management Act

Information system regulations

PCI-DSS, GDPR, HIPAA, Hi-Trust, SOX, ISO series etc.

Intellectual property

Copyright, Trademark, Patents, Trade Secrets

Data security controls and data ownership

Data in Use, Data in Rest, Data in Transit, Data Custodian, Data Processor, Data Controller, System owners, Administrators, End Users

Data destruction mechanism

Sanitize, Degaussing, Erase, Overwrite

Security architecture framework and security models

Zachman Framework, Sherwood Applied Business Security Architecture (SABSA), Information Technology Infrastructure Library (ITIL), State Machine Models, Multilevel Lattice Models, Information Flow Models

Mobile security

Device Encryption

Remote wiping

Remote lock out

Internal locks (voice, face recognition, pattern, pin, password)

Application installation control

Asset tracking (IMIE)

Mobile Device Management

Removable storage (SD CARD, Micro SD etc.)

IoT and Internet security

Network Segmentation (Isolation)

Logical Isolation(VLAN)

Physical isolation (Network segments)

Application firewalls

Firmware updates

Physical security

Various threats to Physical Security

System virtualization

Guest OS, Virtualization Threats, Cloud Computing Models, Cloud Computing Threats

Web security

OWASP, OWASP Top 10, SQL Injection, XSS, CSRF

Cryptography

Goals of Cryptography, Symmetric and Asymmetric Encryption, Decryption, Digital Signature, Hashing, Cryptography Algorithms (DES, AES, IDEA, two fish)

Network Security

OSI Model, Attacks in OSI Layers, Network Types, Network Methods and Standards, Hardware devices, VPN protocols,

Firewall and Parameter security

Firewall, Types of Firewalls, DMZ, Honey Pot, Honey Net

Different types of network attacks

Virus, Worms, Logic Bomb, Trojan, Backdoor, Sniffing, Zero Day attack, Ransomware, Rootkit, Spyware, DoS, DDos, Botnet etc.

Email Security

LDAP,SASL,S/MIME

Identity and access management

3 factor authentication, SSO, Authorization, Federated Identity, Access Control Models, Access Control Categories, Access control types

Vulnerability assessment and pen test

Steps involved, Test Types, Test Strategies, Reporting

Software Development and testing

Development Models, Development lifecycle, Testing types, Code review and testing

Security Operations and Incident management

Evidence Life Cycle, IDS, IPS, Backup, SIEM, Hardening Process

Threat hunting and attack framework

Cyber Kill Chain Process, Mitre Attack framework, Threat Hunting benefits

Social Engineering Attack

Phishing, Spear Phishing, Whaling, Piggybacking, Watering Hole

Assessment and Knowledge test

Assessment and Knowledge test

Viva and Interview preparation

Viva and Interview preparation

Other courses offered by Apponix Academy

5.5 K
100 hours
– / –
36 K
60 hours
– / –
– / –
60 hours
– / –
– / –
– / –
– / –
View Other 2 CoursesRight Arrow Icon

Cyber Security Course
 at 
Apponix Academy 
Students Ratings & Reviews

4/5
Verified Icon1 Rating
P
Prasanna Kumar Katti
Cyber Security Course
Offered by Apponix Academy
4
Learning Experience: Course content was good enough for Cybersecurity and CEH fresher, coming to placements section institute doesnt help yo for placements
Faculty: My trainer at apponix for Cybersecurity was one of the best trainer i got Course curriculum was updated and every topics were covered for a penetration testing, vulnerability assessment and ethical hacking
Course Support: Initially when they were selling me the course it was along with 1 year of placement assistance but after completing the course no placement assistance was held for me
Reviewed on 25 Jun 2022Read More
Thumbs Up IconThumbs Down Icon
View 1 ReviewRight Arrow Icon
qna

Cyber Security Course
 at 
Apponix Academy 

Student Forum

chatAnything you would want to ask experts?
Write here...