Course Duration
- 45 Hrs
Cyber Security Fees
11,799 Rs.
Eligibility
Open to all Learners
Course Duration
- 90 Hrs
Cloud Computing Fee
- 3600 Rs.
Eligibility
All Learners
Foundational Course in Cyber Security
(NASSCOM Certified)
Gain a solid foundation in cyber security by mastering key concepts, deployment models, service models, and essential cloud technologies — all in just 45 hours. Develop the skills to design, implement, and manage secure cloud-based solutions with confidence
Course Modules
- Course duration: 45 Hrs
Module 1: Fundamentals of Cybersecurity
- Fundamentals of Cyber Security and the relevance of Cyber Security.
- Difference between Information Security and Cyber Security.
- Types of cyber security threats, Attacks & Malwares .
- Explain enterprise architecture and different components of enterprise architecture.
Module 2: Fundamental of Networking
- Networking Concepts & terminologies.
- Internet Protocols & Firewalls.
- Explain the fundamentals of network firewalls.
- Discuss different components of network infrastructure .
- Explain different types of internet protocols (such as IPv4, IPv6 etc.)
Module 3: Basics of Security Testing
- Security testing & audit.
- Ethical hacking concept.
- Discuss popular security test tools available and their applications.
- Discuss the fundamental concepts of network monitoring.
- Define Ethical Hacking and explain its applications.
Module 4 : Fundamentals of Access Management
- Identity and Access Management (IAM) .
- Explain the basics of Single Sign On (SSO) authentication.
- Explain different types of user authorisation and encryptions .
- Discuss different types of security controls.
- Explain the fundamental concepts of User Identification, Authentication and Authorization .
Module 5: Fundamentals of incidence management and response
- Security Policy framework .
- Define what are the security controls.
- Explain security policies and different types of security policy frameworks.
- Explain different types of cyber security investigation.
- Define Business Continuity Plans and fundamentals of Disaster Recovery .
- Explain security policies and different types of security policy frameworks.
Module 6: Fundamentals of Security Operations
- Discuss the fundamentals and applications of security forensics.
- Explain different types of security forensics.
- Explain how to monitor the security of systems using system logs.
- Explain different techniques used for continuous security monitoring.
- Discuss how to prevent loss of data.
- Explain the basics of change management.
Project Work (Practical Assignment)
Students will complete a small project using the skills learned in the course.
- Deploy a standard web application and demonstrate how to monitor different systems (networks, servers, etc.) using standard security information and event management (SIEM) tools. (such as IBM QRadar, Splunk Enterprise Security etc.).
- Demonstrate how to create a disaster recovery plan for a web application where the database server is affected by malware. Use standards software, tools, and packages such as MySQL, Linux, Apache etc. to create the web application and back-up for the web application’s database.
- Demonstrate Identity and Access Management in practice using standards tools provided by a public cloud provider (such as AWS, Azure, Google Cloud, etc.).
- Demonstrate how to create access policies and enable or disable access for specific users.