Cyber Security Training

Cyber Security program will equip you with the skills needed to become an expert in this rapidly growing domain.  Cyber Security Course talks about the methods to protecting your infrastructure,…

Created by

Stalwart Learning

Category

Date & Time

Price

Duration

5 Days

Location

https://stalwartlearning.com

ENQUIRE NOW


Course Description

Overview of Cyber Security

Cyber Security program will equip you with the skills needed to become an expert in this rapidly growing domain. 

Cyber Security Course talks about the methods to protecting your infrastructure, running risk analysis and mitigation, securing data and information, architecting cloud-based security, achieving compliance and much more with this best-in-class program.

Duration

5 Days

Prerequisite for Cyber Security

The course does not assume any prior knowledge of computer security and can be enjoyed by anyone interested in improving the security of their digital information.

Course Outline for Cyber Security

Networking Concepts Overview
  • Basics of Communication Systems
  • Transmission Media
  • ISO/OSI and TCP/IP Protocol Stacks
  • Local Area Networks
  • Wide Area Networks
  • Internetworking
  • Packet Formats
  • Wireless Networks
  • The Internet
Information Security Concepts
  • Information Security Overview
  • Information Security Services
  • Types of Attacks
  • Goals for Security
  • E-commerce Security
  • Computer Forensics
  • Steganography
  • Security Engineering
Security Threats and vulnerabilities
  • Overview of Security threats
  • Hacking Techniques
  • Password Cracking
  • Insecure Network connections
  • Malicious Code
  • Programming Bugs
  • Cybercrime and Cyber terrorism
  • Information Warfare and Surveillance
Cryptography
  • Introduction to Cryptography
  • Symmetric key Cryptography
  • Asymmetric key Cryptography
  • Message Authentication and Hash functions
  • Digital Signatures
  • Public Key infrastructure
  • Diffe-Hellman key exchange protocol
  • Applications of Cryptography
Security Management Practices
  • Overview of Security Management
  • Information Classification Process
  • Security Policy
  • Risk Management
  • Security Procedures and Guidelines
  • Business Continuity and Disa ster Recovery
Security Laws and Standards
  • Security Assurance
  • Security Laws
  • International Standards
  • Security Audit
  • OCTAVE approach
  • SSE-CMM
Access Control and Intrusion Detection
  • Overview of Identification and Authorization
  • I & A Techniques
  • Overview of IDS
  • Intrusion Detection Systems and Intrusion Prevention Systems
Server Management and Firewalls
  • User Management
  • DNS Routing and Load Balancing
  • Overview of Firewalls
  • Types of Firewalls
  • DMZ and firewall features
Security for VPN and Next Generation Networks
  • VPN Security
  • Security in Multimedia Networks
  • Fax Security
  • Link Encryption Devices
Security Architectures and Models
  • Designing Secure Operating Systems
  • Controls to enforce security services
  • Information flow model and Biba model
System Security
  • Desktop Security
  • email security: PGP and SMIME
  • Web Security: web authentication, SSL and SET
OS Security
  • OS Security Vulnerabilities, updates and patches
  • OS integrity checks
  • Anti-virus software
  • Design of secure OS and OS hardening
  • Configuring the OS for security 
  • Trusted OS

ENQUIRE NOW