Course Duration

Cyber Security Fees

11,799 Rs. 

Eligibility

Open to all Learners 

Course Duration

Cloud Computing Fee

Eligibility

All Learners 

Foundational Course in Cyber Security
(NASSCOM Certified)

Gain a solid foundation in cyber security by mastering key concepts, deployment models, service models, and essential cloud technologies — all in just 45 hours. Develop the skills to design, implement, and manage secure cloud-based solutions with confidence

Course Modules

Module 1: Fundamentals of Cybersecurity

  • Fundamentals of Cyber Security and the relevance of Cyber Security.
  • Difference between Information Security and Cyber Security.
  • Types of cyber security threats, Attacks & Malwares .
  • Explain enterprise architecture and different components of enterprise architecture.

Module 2: Fundamental of Networking

  • Networking Concepts & terminologies.
  • Internet Protocols & Firewalls.
  • Explain the fundamentals of network firewalls.
  • Discuss different components of network infrastructure .
  • Explain different types of internet protocols (such as IPv4, IPv6 etc.)

Module 3: Basics of Security Testing

  • Security testing & audit.
  • Ethical hacking concept.
  • Discuss popular security test tools available and their applications.
  • Discuss the fundamental concepts of network monitoring.
  • Define Ethical Hacking and explain its applications.

Module 4 : Fundamentals of Access Management

  • Identity and Access Management (IAM) .
  • Explain the basics of Single Sign On (SSO) authentication.
  • Explain different types of user authorisation and encryptions .
  • Discuss different types of security controls.
  • Explain the fundamental concepts of User Identification, Authentication and Authorization .

Module 5: Fundamentals of incidence management and response

  • Security Policy framework .
  • Define what are the security controls.
  • Explain security policies and different types of security policy frameworks.
  • Explain different types of cyber security investigation.
  • Define Business Continuity Plans and fundamentals of Disaster Recovery .
  • Explain security policies and different types of security policy frameworks.

Module 6: Fundamentals of Security Operations

  • Discuss the fundamentals and applications of security forensics.
  • Explain different types of security forensics.
  • Explain how to monitor the security of systems using system logs.
  • Explain different techniques used for continuous security monitoring.
  • Discuss how to prevent loss of data.
  • Explain the basics of change management.

Project Work (Practical Assignment)

Students will complete a small project using the skills learned in the course.

  • Deploy a standard web application and demonstrate how to monitor different systems (networks, servers, etc.) using standard security information and event management (SIEM) tools. (such as IBM QRadar, Splunk Enterprise Security etc.).
  • Demonstrate how to create a disaster recovery plan for a web application where the database server is affected by malware. Use standards software, tools, and packages such as MySQL, Linux, Apache etc. to create the web application and back-up for the web application’s database.
  • Demonstrate Identity and Access Management in practice using standards tools provided by a public cloud provider (such as AWS, Azure, Google Cloud, etc.).
  • Demonstrate how to create access policies and enable or disable access for specific users.

Course Details & Enrollment

Know More About the Course