Cyber Security Training

Cyber Security program will equip you with the skills needed to become an expert in this rapidly growing domain. 

Cyber Security Course talks about the methods to protecting your infrastructure, running risk analysis and mitigation, securing data and information, architecting cloud-based security, achieving compliance and much more with this best-in-class program.

5 Days

The course does not assume any prior knowledge of computer security and can be enjoyed by anyone interested in improving the security of their digital information

  • Basics of Communication Systems
  • Transmission Media
  • ISO/OSI and TCP/IP Protocol Stacks
  • Local Area Networks
  • Wide Area Networks
  • Internetworking
  • Packet Formats
  • Wireless Networks
  • The Internet
  • Information Security Overview
  • Information Security Services
  • Types of Attacks
  • Goals for Security
  • E-commerce Security
  • Computer Forensics
  • Steganography
  • Security Engineering
  • Overview of Security threats
  • Hacking Techniques
  • Password Cracking
  • Insecure Network connections
  • Malicious Code
  • Programming Bugs
  • Cybercrime and Cyber terrorism
  • Information Warfare and Surveillance
  • Introduction to Cryptography
  • Symmetric key Cryptography
  • Asymmetric key Cryptography
  • Message Authentication and Hash functions
  • Digital Signatures
  • Public Key infrastructure
  • Diffe-Hellman key exchange protocol
  • Applications of Cryptography
  • Overview of Security Management
  • Information Classification Process
  • Security Policy
  • Risk Management
  • Security Procedures and Guidelines
  • Business Continuity and Disa ster Recovery
  • Security Assurance
  • Security Laws
  • International Standards
  • Security Audit
  • OCTAVE approach
  • SSE-CMM
  • Overview of Identification and Authorization
  • I & A Techniques
  • Overview of IDS
  • Intrusion Detection Systems and Intrusion Prevention Systems
  • User Management
  • DNS Routing and Load Balancing
  • Overview of Firewalls
  • Types of Firewalls
  • DMZ and firewall features
  • VPN Security
  • Security in Multimedia Networks
  • Fax Security
  • Link Encryption Devices
  • Designing Secure Operating Systems
  • Controls to enforce security services
  • Information flow model and Biba model
  • Desktop Security
  • email security: PGP and SMIME
  • Web Security: web authentication, SSL and SET
  • OS Security Vulnerabilities, updates and patches
  • OS integrity checks
  • Anti-virus software
  • Design of secure OS and OS hardening
  • Configuring the OS for security 
  • Trusted OS