Edureka
Edureka Logo

Cyber Security Course 

  • Offered byEdureka

Cyber Security Course
 at 
Edureka 
Overview

Duration

6 months

Total fee

12,745

Mode of learning

Online

Credential

Certificate

Cyber Security Course
 at 
Edureka 
Highlights

  • Industry Recognised Certification
  • Live Interactive Learning
  • Lifetime Access
  • 24x7 Support
  • Hands-On Project Based Learning
Read more
Details Icon

Cyber Security Course
 at 
Edureka 
Course details

Who should do this course?
  • For Freshers who want to build careers in cybersecurity
  • For Qualified IT experts looking for their career shift or widen their skills in Cybersecurity
  • For Anyone interested in Cybersecurity job roles like Network Administrator, System Administrator, Security Analyst, Security Engineer, Ethical Hacker, Pen Tester, and more
What are the course deliverables?
  • This cyber security training course is built to cover a holistic & a wide variety of foundational topics of cybersecurity domain which will be helpful to lead freshers as well as IT professional having 1 to 2 years of experience, into the next level of choice such as Network Administrator / System Administrator / Security Analyst / Security Engineer / Ethical Hacker/ Cryptographer / Penetration Tester and so on
  • This Cyber security online course focuses mainly on the concepts of Cybersecurity and Ethical Hacking
  • In this cyber security training program we are going to deal with cybersecurity, ethical hacking, cryptography, computer networks & security, application security, idAM (identity & access management), vulnerability analysis, malware threats, sniffing, SQL injection, DoS, session hijacking and various security practices for businesses
Read more
More about this course
  • Edureka?s Cyber Security course will help you learn various concepts such as ethical hacking, cryptography, computer networks & security, application security, idAM (identity & access management), vulnerability analysis, malware threats, sniffing, SQL injection, DoS, session hijacking, and various security practices for businesses from scratch with hands-on demonstrations

Cyber Security Course
 at 
Edureka 
Curriculum

Introduction to Cyber security & Ethical Hacking

Need of Cybersecurity

CIA Triad

Security Architecture

Security Governance

Security Auditing

Regulations & Frameworks

Ethical Hacking

Types of Hackers

Phases of Ethical Hacking

Penetration Testing

Types of Penetration Testing

Footprinting

Objectives of Footprinting

Types of Footprinting

Footprinting Techniques

Introduction to Cyber security & Ethical Hacking

Types of cryptography

Symmetric cryptography

Asymmetric cryptography

Hash functions

Digital signatures

Public Key Infrastructure (PKI)

Attacks on cryptosystems

Computer Networks & Security

Introduction to Computer Network

Computer Networks - Architecture

Layered architecture

Open Systems Interconnect (OSI) Model

Transmission Control Protocol/Internet Protocol (TCP/IP)

Network Scanning

Enumeration

Common Network Threats/Attacks

Application and Web Security

Web server architecture

Web server attacks

Countermeasures and patch management

Web application architecture

Web application attacks

IdAM (Identity and Access Management)

Authentication and authorization

Authentication and authorization principles

Regulation of access

Access administration

IdAM

Password protection

Identity theft

Vulnerability Analysis & System Hacking

Vulnerability Analysis

Types of Vulnerability Analysis

Vulnerability Assessment Lifecycle

Vulnerability Assessment Tools

Vulnerability Scoring Systems

Vulnerability Assessments Report

System Hacking

Password Cracking

Privilege escalation

Executing Applications

Hiding Files

Clearing Logs

Sniffing and SQL Injection

Malware and its propagation ways

Malware components

Types of malware

Concept of sniffing

Types of sniffing

Types of sniffing attacks

SQL injection

Types of SQL injection

SQL injection Methodologies

DoS and Session Hijacking

DoS attack

DDoS attack

Common symptoms of DoS/DDoS attack

Categories of DoS/DDoS Attack Vectors

DoS/DDoS detection techniques

Session hijacking

Application level session hijacking

Network level session hijacking

Intrusion Detection System (IDS)

Types of Intrusion Detection Systems

Introduction to Firewalls

Types of Firewalls

Introduction to Honeypots

Evading IDS

Other courses offered by Edureka

50 K
200 hours
– / –
42 K
5 weeks
– / –
4.75 L
1 year
– / –
50 K
5 weeks
– / –
View Other 92 CoursesRight Arrow Icon

Cyber Security Course
 at 
Edureka 
Students Ratings & Reviews

4.7/5
Verified Icon3 Ratings
S
Sneha Shivangi
Cyber Security Course
Offered by Edureka
5
Learning Experience: Helpful Teachers they will make sure that you understand every topic precisely and in-depth Doubt clearing facility is also there you can quickly raise your ticket and get your query solved also, LMS is well maintained with the option of various versions through which you can choose whichever is friendly for your use case
Faculty: Faculty was nice Course curriculum was good
Course Support: By enhancing knowledge
Reviewed on 11 Feb 2023Read More
Thumbs Up IconThumbs Down Icon
G
Gnyaneshwar Chamalwar
Cyber Security Course
Offered by Edureka
4
Learning Experience: The content of the course was good and as a beginner experience was good for the start of the career in cyber security
Faculty: The faculty approach was great in teaching wise and well explained in theoretically and practical wise the approach was good. I liked the course not because of the resources, I liked it because of the beginning of my career from basics to intermediate
Course Support: No i didn't get any career support because the course was only made for teaching purpose. However the trainer helped in some kind of job assistance
Reviewed on 9 Jan 2022Read More
Thumbs Up IconThumbs Down Icon
View All 2 ReviewsRight Arrow Icon
qna

Cyber Security Course
 at 
Edureka 

Student Forum

chatAnything you would want to ask experts?
Write here...