Cyber Security Course
- Offered byEdureka
Cyber Security Course at Edureka Overview
Duration | 6 months |
Total fee | ₹12,745 |
Mode of learning | Online |
Credential | Certificate |
Cyber Security Course at Edureka Highlights
- Industry Recognised Certification
- Live Interactive Learning
- Lifetime Access
- 24x7 Support
- Hands-On Project Based Learning
Cyber Security Course at Edureka Course details
- For Freshers who want to build careers in cybersecurity
- For Qualified IT experts looking for their career shift or widen their skills in Cybersecurity
- For Anyone interested in Cybersecurity job roles like Network Administrator, System Administrator, Security Analyst, Security Engineer, Ethical Hacker, Pen Tester, and more
- This cyber security training course is built to cover a holistic & a wide variety of foundational topics of cybersecurity domain which will be helpful to lead freshers as well as IT professional having 1 to 2 years of experience, into the next level of choice such as Network Administrator / System Administrator / Security Analyst / Security Engineer / Ethical Hacker/ Cryptographer / Penetration Tester and so on
- This Cyber security online course focuses mainly on the concepts of Cybersecurity and Ethical Hacking
- In this cyber security training program we are going to deal with cybersecurity, ethical hacking, cryptography, computer networks & security, application security, idAM (identity & access management), vulnerability analysis, malware threats, sniffing, SQL injection, DoS, session hijacking and various security practices for businesses
- Edureka?s Cyber Security course will help you learn various concepts such as ethical hacking, cryptography, computer networks & security, application security, idAM (identity & access management), vulnerability analysis, malware threats, sniffing, SQL injection, DoS, session hijacking, and various security practices for businesses from scratch with hands-on demonstrations
Cyber Security Course at Edureka Curriculum
Introduction to Cyber security & Ethical Hacking
Need of Cybersecurity
CIA Triad
Security Architecture
Security Governance
Security Auditing
Regulations & Frameworks
Ethical Hacking
Types of Hackers
Phases of Ethical Hacking
Penetration Testing
Types of Penetration Testing
Footprinting
Objectives of Footprinting
Types of Footprinting
Footprinting Techniques
Introduction to Cyber security & Ethical Hacking
Types of cryptography
Symmetric cryptography
Asymmetric cryptography
Hash functions
Digital signatures
Public Key Infrastructure (PKI)
Attacks on cryptosystems
Computer Networks & Security
Introduction to Computer Network
Computer Networks - Architecture
Layered architecture
Open Systems Interconnect (OSI) Model
Transmission Control Protocol/Internet Protocol (TCP/IP)
Network Scanning
Enumeration
Common Network Threats/Attacks
Application and Web Security
Web server architecture
Web server attacks
Countermeasures and patch management
Web application architecture
Web application attacks
IdAM (Identity and Access Management)
Authentication and authorization
Authentication and authorization principles
Regulation of access
Access administration
IdAM
Password protection
Identity theft
Vulnerability Analysis & System Hacking
Vulnerability Analysis
Types of Vulnerability Analysis
Vulnerability Assessment Lifecycle
Vulnerability Assessment Tools
Vulnerability Scoring Systems
Vulnerability Assessments Report
System Hacking
Password Cracking
Privilege escalation
Executing Applications
Hiding Files
Clearing Logs
Sniffing and SQL Injection
Malware and its propagation ways
Malware components
Types of malware
Concept of sniffing
Types of sniffing
Types of sniffing attacks
SQL injection
Types of SQL injection
SQL injection Methodologies
DoS and Session Hijacking
DoS attack
DDoS attack
Common symptoms of DoS/DDoS attack
Categories of DoS/DDoS Attack Vectors
DoS/DDoS detection techniques
Session hijacking
Application level session hijacking
Network level session hijacking
Intrusion Detection System (IDS)
Types of Intrusion Detection Systems
Introduction to Firewalls
Types of Firewalls
Introduction to Honeypots
Evading IDS