Prerequisite – Basic computer & network knowledge
Duration – 30 hrs


Training Fee includes the following :
  • Class recordings
  • Create Lab environment on your PC
  • Software's
  • Assignments
  • E-Books & Other study materials.

Cyber Security 

  1. Introduction to Cyber Security 
    1. What is Cyber Security
    2. Common types of Cyber Security Threats
    3. What Cyber Security can prevent
    4. Careers in Cyber Security
    5. Impact of Cyber Security on your business
    6. How to minimise the impact of Cyber Attack on business
    7. Surface Web, Deep Web, Dark Web & Darknet
    8. Cyber Security Principles
    9. Case Study
    10. Types of Hackers
    11. Defence in depth
    12. Types of Security Policy
    13. Vulnerability Assessment
    14. Penetration Testing
  2. System Hacking & Securing Operating Systems Nontechnical Attacks or Non-Electronic Attacks
    1. Active Online Attacks
    2. Passive Online Attacks
    3. Spywares & Key loggers
    4. Steganography
    5. Steganalysis
    6. Guidelines To Secure Windows OS
  3. Malware Threats 
    1. What is Malware
    2. Categories Of Malware
    3. Common Ways Malware Infects your Computer
    4. Computer malware Symptoms
    5. ways to prevent malware infection
  4. Network Sniffing 
    1. What is Network Sniffing?
    2. Network Sniffing can
    3. How a Sniffer works?
    4. Protocols which are affected by Sniffing
    5. Hardware Protocol Analyzers
    6. How to Defend Against Sniffing
  5. Web browser Security
    1. Securing Web browsing VPN
      • Proxy Server
      • TOR
    2. Session Hijacking
    3. Countermeasures
  6. Securing Email Communications 
    1. Email Footprinting
    2. Email Encryption
  7. Social Engineering 
    1. Social Engineering Concepts 
    2. Impact of Attack on Organization
    3. Human Behaviours Vulnerable to Social Engineering attacks
    4. Factors that make companies vulnerable to attacks
    5. Social Engineering Prevention
    6. Social Engineering Techniques
    7. How to avoid being a victim
    8. What can you do if you are a victim
    9. Identity Theft 
    10. Countermeasures
  8. DOS/DDOS Attacks 
    1. DoS/DDoS Concepts 
    2. Botnet 
    3. Counter-measures
  9. Securing Mobile Devices 
    1. Mobile Security - Attack Vectors
    2. Consequences of Attack Vectors
    3. Mobile Spam
    4. How to Secure iPhone and iPad Devices
    5. How to Secure Android Devices
    6. How to Secure Windows Device
  10. Securing Wireless Networks 
    1. Wireless Concepts 
    2. Wireless Encryption 
    3. Best practices to improve the security of your wireless network
    4. Wireless Threats 
    5. Counter-measures
  11. Securing The Cloud 
    1. Introduction to Cloud Computing
    2. Cloud Computing Threats
    3. Cloud Computing Attacks
    4. Cloud Security
  12. Cryptography 
    1. Cryptography Concepts 
    2. Encryption 
    3. Types of Encryption
    4. Diffie-Hellman Key Exchange
    5. Cryptographic Hash Functions
    6. Digital Signatures
    7. Digital Certificates
    8. Cryptography Tools 
    9. Disk Encryption
  13. Data Backup and Disaster Recovery 
    1. Data Backup Concepts
    2. Types of Data Backups
    3. Windows Backup and Restore Procedures
    4. Secure Data Destruction
  14. Information Security Law & Standards