Cyber Security

Overview

    • Cyber Security program will equip the participants with the skills needed to become an expert in this swiftly growing domain.
    • Cyber Security Course discusses about the methods to protecting your infrastructure, running risk analysis & mitigation, securing data & information, architecting cloud-based security, achieving compliance & much more with this best-in-class program.
Duration
5 Days

Pre-Requisites
Not Applicable

Course Outline

  • Basics of Communication Systems
  • Transmission Media
  • ISO/OSI and TCP/IP Protocol Stacks
  • Local Area Networks
  • Wide Area Networks
  • Internetworking
  • Packet Formats
  • Wireless Networks
  • The Internet
  • Information Security Overview
  • Information Security Services
  • Types of Attacks
  • Goals for Security
  • E-commerce Security
  • Computer Forensics
  • Steganography
  • Security Engineering
  • Overview of Security threats
  • Hacking Techniques
  • Password Cracking
  • Insecure Network connections
  • Malicious Code
  • Programming Bugs
  • Cybercrime and Cyber terrorism
  • Information Warfare and Surveillance
  • Introduction to Cryptography
  • Symmetric key Cryptography
  • Asymmetric key Cryptography
  • Message Authentication and Hash functions
  • Digital Signatures
  • Public Key infrastructure
  • Diffe-Hellman key exchange protocol
  • Applications of Cryptography
  • Overview of Security Management
  • Information Classification Process
  • Security Policy
  • Risk Management
  • Security Procedures and Guidelines
  • Business Continuity and Disa ster Recovery
  • Security Assurance
  • Security Laws
  • International Standards
  • Security Audit
  • OCTAVE approach
  • SSE-CMM
  • Overview of Identification and Authorization
  • I & A Techniques
  • Overview of IDS
  • Intrusion Detection Systems and Intrusion Prevention Systems
  • VPN Security
  • Security in Multimedia Networks
  • Fax Security
  • Link Encryption Devices
  • Designing Secure Operating Systems
  • Controls to enforce security services
  • Information flow model and Biba model
  • Desktop Security
  • email security: PGP and SMIME
  • Web Security: web authentication, SSL and SET
  • OS Security Vulnerabilities, updates and patches
  • OS integrity checks
  • Anti-virus software
  • Design of secure OS and OS hardening
  • Configuring the OS for security 
  • Trusted OS