Cybersecurity Certification Course
Course Description
SkillHigher’s Cybersecurity Certification Course will help you in establishing a strong foundation towards your journey in the Cybersecurity domain. As part of this Cybersecurity course, you will be learning about the various fundamental concepts about Security essentials, Cryptography, Network Security, Application Security, Data & Endpoint Security, Cloud Security, Cyber Attacks and Identity & Access Management.
Why this course ?
- Public and Government sectors are offering attractive packages for cyber security professionals due to growing demands
- By 2022, the world will require 6 million cyber security experts ~ Symantec and Cisco
- Global cyber security industry is estimated to cross US$ 220 billion by 2021.
Curriculums
-
Learning Objective: In this module, you will learn about the essential building blocks and basic concepts around cyber security such as Confidentiality, Integrity, Availability, Authentication, Authorization, Vulnerability, Threat & Risk and so on. In addition to these concepts, you will also explore the core topics such as Security Governance, Audit, Compliance and Security Architecture.
Topics:
Need of Cyber Security
CIA Triad
Vulnerability, Threat and Risk
Risk Governance & Risk Management
Security Architecture
Security Governance
Security Auditing
Compliance
Computer Security Architecture & DesignHands On/Demo::
Data Breaches
Internet Threat Scenario -
Learning Objective: In this module you will learn, various forms of Cryptographic techniques, their pragmatic relevance & weaknesses. You will learn how cryptography, its components, methods and its usage are employed in the enterprise to store and transmit messages safely.
Topics:
Background of Cryptography
Symmetric Cryptography
Data Encryption Standard (DES)
Triple-DES
The Advanced Encryption Standard (AES)
International Data Encryption Algorithm (IDEA)
Blowfish
RC4
RC5
RC6
Asymmetric Cryptography
The Diffie-Hellman Algorithm
RSA
Elliptic Curve Cryptosystems (ECC)
Cryptographic Hash Functions
Attacks against Encrypted Data
Digital Certificates and its Format (X.509, X.500)
Certificate Authority, Certificate Repository, Certificate Revocation lists
Digital Certificate life cycle (Initialize, Issue, Cancel)Hands On/Demo::
Image Steganography
Hashing -
Learning Objective: In this module, you will glance over various aspects related to Computer Networks and in-parallel delve into understanding the weaknesses & concepts around securing the networks.
Topics:
Network architecture, protocols, and technologies: Layered architecture, Open Systems Interconnect (OSI) Model
Transmission Control Protocol/Internet Protocol (TCP/IP)
Hybrid TCP/IP Model
Application Layer Protocols: HTTP, SNMP, DNS, POP, SMTP
Transport layer protocols: Transmission Control Protocol (TCP), User Datagram Protocol (UDP)
Network/Internet layer protocols: Internet Protocol (IP) v4, IPv6, IPsec protocols
Link layer protocols: Address Resolution Protocol (ARP) / Reverse ARP / Proxy ARP, Ethernet, VLANHands On/Demo::
Sniffer
IP Address -
Learning Objective: In this module, you learn the importance of Application level security. You will glance over various known application weaknesses, techniques to attack them and various controls/ solutions to these vulnerabilities. You will also get an overview of Secure SDLC methodology.
Topics:
Importance of Application Security
OWASP Top 10 web application vulnerabilities
SSDLC (Secure Software Development Life Cycle)Hands On/Demo::
SQL Injection
Buffer Overflow -
Learning Objective: In this module, you will glance over, various aspects related to data and endpoint (host) security. This being a primary need, is a very crucial topic.
Topics:
Data Security
Data Security Controls
Endpoint Security
Host/ Endpoint Security ControlsHands On/Demo::
Computer Monitoring
System Recovery -
Learning Objective: Identity and access management (IdAM) is the security discipline that enables the appropriate individuals to access the right resources at the right times for the right reasons. IdAM addresses the mission-critical need to ensure appropriate access to resources across increasingly heterogeneous technology environments, and to meet the increasingly rigorous compliance requirements. This security practice is a crucial undertaking for any enterprise. Enterprises that develop mature IAM capabilities can reduce their identity management costs and more importantly, become significantly more responsive in supporting new business initiatives.
In this module you will glance over, various aspects related to the principle of Identity & Access Management. This covers various intricacies around concepts of Authorization, Authentication, Identity & access management and its benefits to an enterprise.
Topics:
Authorization
Authentication
Access Control
Privilege levels
IAM life cycle
Identity & Access Management Process and activities (Role Based, Single Sign on)Hands On/Demo::
Password Management
Phishing -
Learning Objective: In this module you will glance over a vast topic of securing the cloud! You will first have an overview of types of cloud infrastructure and then delve into security concerns & potential solutions.
Topics:
Cloud Computing Architectural Framework
Concerns & Best Practices
Governance and Enterprise Risk Management
Legal Issues: Contracts and Electronic Discovery
Compliance and Audit Management
Information Management and Data Security
Interoperability and Portability
Traditional Security, Business Continuity, and Disaster Recovery
Data Centre Operations
Incident Response
Application Security
Encryption and Key Management
Identity, Entitlement, and Access Management
Virtualization
Security as a ServiceHands On/Demo::
Virtual Machine
Cloud based Application Vulnerabilities -
Note: This is a self-paced module
Learning Objective: A business primarily is about making profits via achieving set targets and by catering best to customers and keeping shareholders and investors happy. This involves huge number of complex and interdependent discrete processes to run smoothly, efficiently and in a well monitored way. Today IT being one of the core enablers & also an increasingly major business platforms – threats are more than likely to cause enough disruption that may cause the business to derail completely.
In this module we will glance over a variety of such business processes – to appreciate the relation, applicability and practicability of various information/ cyber security and risk management concepts that may be put in place to help the business stay predictable, safer and within a controlled cyber risk profile thereby enabling it to continue chasing its set targets.
Topics:
Key Security Business Processes
Corp. & Security Governance
IT Strategy management
Portfolio/Program/Project management
Change management
Supplier (third party) management
Problem management
Knowledge management
Info-sec management
BCP
IT Operations management
Overview of top 20 security controlsHands On/Demo::
Honeypot
Website Mirroring