Cyber Security
Overview
-
- Cyber Security program will equip the participants with the skills needed to become an expert in this swiftly growing domain.
- Cyber Security Course discusses about the methods to protecting your infrastructure, running risk analysis & mitigation, securing data & information, architecting cloud-based security, achieving compliance & much more with this best-in-class program.
5 Days
Pre-Requisites
Not Applicable
Course Outline
- Basics of Communication Systems
- Transmission Media
- ISO/OSI and TCP/IP Protocol Stacks
- Local Area Networks
- Wide Area Networks
- Internetworking
- Packet Formats
- Wireless Networks
- The Internet
- Information Security Overview
- Information Security Services
- Types of Attacks
- Goals for Security
- E-commerce Security
- Computer Forensics
- Steganography
- Security Engineering
- Overview of Security threats
- Hacking Techniques
- Password Cracking
- Insecure Network connections
- Malicious Code
- Programming Bugs
- Cybercrime and Cyber terrorism
- Information Warfare and Surveillance
- Introduction to Cryptography
- Symmetric key Cryptography
- Asymmetric key Cryptography
- Message Authentication and Hash functions
- Digital Signatures
- Public Key infrastructure
- Diffe-Hellman key exchange protocol
- Applications of Cryptography
- Overview of Security Management
- Information Classification Process
- Security Policy
- Risk Management
- Security Procedures and Guidelines
- Business Continuity and Disa ster Recovery
- Security Assurance
- Security Laws
- International Standards
- Security Audit
- OCTAVE approach
- SSE-CMM
- Overview of Identification and Authorization
- I & A Techniques
- Overview of IDS
- Intrusion Detection Systems and Intrusion Prevention Systems
- VPN Security
- Security in Multimedia Networks
- Fax Security
- Link Encryption Devices
- Designing Secure Operating Systems
- Controls to enforce security services
- Information flow model and Biba model
- Desktop Security
- email security: PGP and SMIME
- Web Security: web authentication, SSL and SET
- OS Security Vulnerabilities, updates and patches
- OS integrity checks
- Anti-virus software
- Design of secure OS and OS hardening
- Configuring the OS for security
- Trusted OS
