Cyber Security
- Offered byedifypath
Cyber Security at edifypath Overview
Duration | 60 hours |
Total fee | ₹17,500 |
Mode of learning | Online |
Credential | Certificate |
Cyber Security at edifypath Highlights
- Internship & Placement opportunities
- Hands-on lab access
Cyber Security at edifypath Course details
- This course is targeted toward an Information Technology (IT) professional who has networking and administrative skills in Windows-based TCP/IP networks and familiarity with other operating systems, such as OS X, Unix, or Linux, and who wants to further a career in IT by acquiring a foundational knowledge of security topics; prepare for the CompTIA Security+ Certification examination; or use Security+ as the foundation for advanced security certifications or career roles
- Identify the fundamental concepts of computer security.
- Identify security threats and vulnerabilities.
- Examine network security.
- Manage application, data and host security.
- Identify access control and account management security measures.
- Manage certificates.
- Identify compliance and operational security measures.
- Manage risk & security incidents.
- Develop business continuity and disaster recovery plans.
- Cybersecurity is the practice of protecting digital devices, networks, and sensitive information from unauthorized access, theft, and damage
Cyber Security at edifypath Curriculum
M-1
Security Roles and Security Controls
Compare and Contrast Information Security Roles
M1
S1
Compare and Contrast Security Control and Framework Types
M1
S2
M-2
Threat Actors and Threat Intelligence
Explain Threat Actor Types and Attack Vectors
M2
S1
Explain Threat Intelligence Sources
M2
S2
M-3
Performing Security Assessments
Assess Organizational Security with Network Reconnaissance Tools
M3
S1
Explain Security Concerns with General Vulnerability Types
M3
S2
Summarize Vulnerability Scanning Techniques
M3
S3
M-4
Social Engineering and Malware
Compare and Contrast Social Engineering Techniques
M4
S1
Analyze Indicators of Malware-based Attacks
M4
S2
M-5
Basic Cryptographic Concepts
Compare and Contrast Cryptographic Ciphers
M5
S1
Summarize Cryptographic Modes of Operation
M5
S2
Summarize Cryptographic Use Cases and Weaknesses
M5
S3
M-6
Public Key Infrastructure
Implement Certificates and Certificate Authorities
M6
S1
Implement PKI Management
M6
S2