Information Security

Quote Request

Cyber Security

Why cyber security has become the backbone of the industries and enterprises now? Thirty years back, no one had even heard of cyber security, but then, no one had heard of hackers and hacks either. This is because of the Internet. It did not come into being with a Big Bang like the Universe, but it sure is expanding like Universe in all directions and now has become all-pervasive. Internet has changed everything. Quick adoption of the technology by businesses and enterprises has made mobile-banking, on-line shopping, on-line trading and social networking possible. Its many benefits help the business growth by creating new opportunities.

Technologies


The following are the various technologies related to Cyber Security

  • Ethical Hacking
  • Mobile Security
  • Digital Forensics
  • Web Application Security
  • VAPT
  • Malware Analysis
  • Network security with Firewalls

Job Roles

  • Security Analyst
  • Security Engineer
  • Security Architect
  • Security Administrator
  • Security Software Developer
  • Cryptographer / Cryptologist
  • Cryptanalyst
  • Chief Information Security Officer
  • Security Consultant/Specialist
  • Intrusion Detection Specialist
  • Computer Security Incident Responder
  • Source Code Auditor
  • Virus Technician
  • Penetration Tester

  • Course structure

    +

    Cyber Security

    Module 1 – Fundamentals

    • Network Fundamentals
    • OS Fundamentals

    Module 2 – Coding

    • Shell scripting
    • Python Scripting

    Module 3 – Network security

    • Reconnaissance
    • Packet Crafting
    • Manual Test Cases
    • Vulnerability Discovery
    • Exploitation
    • Wireless Security
    • Network Security Audit
    • Report Writing

    Module 4 – Server Security

    • Database Security
    • Operating System Security

    Module 5 – Application Security

    • Risk Based Security Testing (Business Logic Testing)
    • ESAPI Security
    • Threat Modeling
    • Source Code Analysis
    • Report Writing Working with Proxy – Burp suite
    • OWASP Top 10 2013

    Module 6 – Digital Forensics

    • Introduction & Case studies
    • Principle of CIA
    • IT Act overview
    • Introduction to Forensics
    • Understanding Incident Response Methodologies
    • Thump rules of investigation
    • Type of forensics investigation
    • Network based log analysis
    • Web Server log analysis
    • Network based log analysis
    • Web Server log analysis

    Module 7 – Compliances

    • Auditing Principle
    • Information Security Management System (ISO 27001:2013)
    • Risk Assessment
    • Business Continuity (ISO 22301:2012)
    • PCI DSS v3
    • Overview – ITIL & COBIT

£0.000 items

Cart