
Cyber Security Certification
01. Course Overview
CSC Academy brings online skill course on Cyber security with the industry experts. The programme offers basic skill training on Cyber security.
Cyber Security study programmes teach you how to protect computer operating systems, networks, and data from cyber-attacks. You will learn how to monitor systems and mitigate threats when they happen.
Cyber security is security as it is applied to information technology. This includes all technology that stores, manipulates, or moves data, such as computers, data networks, and all devices connected to or included in networks, such as routers and switches. All information technology devices and facilities need to be secured against intrusion, unauthorized use, and vandalism. Additionally, the users of information technology should be protected from theft of assets, extortion, identity theft, loss of privacy and confidentiality of personal information, malicious mischief, and damage to equipment, business process compromise, and the general activity of cyber criminals. The public should be protected against acts of cyber terrorism, such as the compromise or loss of the electric power grid
Cyber security is the protection of internet-connected systems such as hardware, software, and data from cyber-threats. The practice is used by individuals and enterprises to protect against unauthorized access to data centres and other computerized systems.
The EC-Council Certified Ethical Hacker course verifies your advanced security skill-sets to thrive in the worldwide information security domain. Many IT departments have made CEH certification a compulsory qualification for security-related posts, making it a go-to certification for security professionals. CEH-certified professionals typically earn 44 percent higher salaries than their non-certified peers.
The ethical hacking certification course opens up numerous career advancement opportunities, preparing you for a role as a computer network defense (CND) analyst, CND infrastructure support, CND incident responder, CND auditor, forensic analyst, intrusion analyst, security manager, and other related high-profile roles.
03. What are the course objectives?
The course will give the fundamental knowledge and practical abilities in Cybersecurity, detect attack methodology and combat hackers from intrusion or other suspicious attempts at connection to gain unauthorized access to a computer and its resources. Protect data and respond to threats that occur over the Internet. A student who completes the Cyber Security and Assurance program will be able to: -
-
Follow a structured model in Security Systems Development Life Cycle (SDLC).
-
Detect attack methodology and combat hackers from intrusion or other suspicious attempts at connection to gain unauthorized access to a computer and its resources.
-
Protect data and respond to threats that occur over the Internet.
-
Plan, implement and audit operating systems' security in a networked, multi-platform and cross platform environment.
-
Provide contingency operations that include administrative planning process for incident response, disaster recovery, and business continuity planning within information security.
Who is this course for?
-
The Cyber security course is designed for beginners.
-
Basic Mathematics Knowledge required.
-
School Kids, Engineers, Designers, and anyone looking to learn Artificial Intelligence, Machine Learning, Deep Learning & Programming.
-
All those who want to enhance their skill set and find a potential business & job opportunity in the space of Cyber security, IT, Programming.
05. Course Content
Course Modules
-
Cyber space
-
Cyber Security
-
Password
-
Common Passwords
-
Endpoint Security
-
Creating a Password
-
Table 1: Tips for Password Management
Calculations - Computation - Communication
-
Computing
-
Communication
-
Calculations
Essentials of Cyber Security Concept
-
Cyber Security and Information Security
-
Fundamentals of Information Assurance
-
Concept of CIA Triad
Functioning of Internet and Network Layers
-
Internet Protocol Address
-
Domain Name System
-
Actions on the Internet after Clicking a Link
-
Layered Architecture of Networks
Basic Threats and Vulnerabilities Part -I
-
Threats through Emails
-
Malicious Codes or Malware Threats
-
Threat Classification
Basic Threats and Vulnerabilities Part -II
-
Virus
-
Virus Grouping
Basic Threats and Vulnerabilities Part - III
-
Worms
-
Classification of Worms
-
Trojan
-
Table 2: How do you find out when your system is infected? Symptoms
-
Table 3: Defence against Computer Infection
Additional Threats and Vulnerabilities
-
Spyware
-
Types of Spyware
-
Botnets
Exploitation: Threats and Vulnerabilities
-
SQL Injections
-
Buffer Overflow
-
Table 2: How do you find out when your system is infected? Symptoms
-
Table 3: Defence against Computer Infection
-
Cross Site Scripting