Course Description

Cyber Security is a comprehensive course to learn the most effective steps to prevent attacks and detect adversaries with actionable techniques that one can directly apply when they get back to work. The participant will learn tips and tricks from the best of the experts from a mix of industry & academia, so that they can win the battle against the wide range of cyber adversaries that want to harm the enterprises’ IT environment.


What You Will Learn

Cryptography

You will master encryption in an easy to follow crash course.

Operating System

We cover operating system security, privacy, and patching - On Windows 7, Windows 8, Windows 10, MacOS and Linux.

Security

Go in-depth into security through physical and virtual isolation and compartmentalization. Covering sandboxes, application isolation, virtual machines, Whonix and Qubes OS.

Watch our "5 min Quick Introduction"


Curriculum

  • Basics of Communication Systems
  • Transmission Media
  • ISO/OSI and TCP/IP Protocol Stacks
  • Local Area Networks
  • Wide Area Networks
  • Internetworking
  • Packet Formats
  • Wireless Networks
  • The Internet
  • Information Security Overview
  • Information Security Services
  • Types of Attacks
  • Goals for Security
  • E-commerce Security
  • Computer Forensics
  • Steganography
  • Security Engineering
  • Overview of Security threats
  • Hacking Techniques
  • Password Cracking
  • Endpoints
  • Insecure Network connections
  • Malicious Code
  • Programming Bugs
  • Cyber crime and Cyber terrorism
  • Information Warfare and Surveillance
  • Introduction to Cryptography
  • Symmetric key Cryptography
  • Asymmetric key Cryptography
  • Message Authentication and Hash functions
  • Digital Signatures
  • Public Key infrastructure
  • Diffe-Hellman key exchange protocol
  • Applications of Cryptography
  • Overview of Security Management
  • Information Classification Process
  • Security Policy
  • Risk Management
  • Security Procedures and Guidelines
  • Business Continuity and Disaster Recovery
  • Security Assurance
  • Security Laws
  • International Standards
  • Security Audit
  • OCTAVE approach
  • SSE-CMM
  • Overview of Identification and Authorization
  • I & A Techniques
  • Overview of IDS
  • Intrusion Detection Systems and Intrusion Prevention Systems
  • User Management
  • DNS Routing and Load Balancing
  • Overview of Firewalls
  • Types of Firewalls
  • DMZ and firewall features

What you will get

Guaranteed Internship

  • Internship letter from Verzeo

  • Guaranteed Internship offers from tied up companies
Certified Professionals

  • Opportunity to be taught by Certified Professionals.

  • Opportunity to work on Major and Minor Projects mentored by the Corporate Trainers.
Projects

  • Gaining access to exclusive course content, etc., as part of the course.
  • Total of 2 projects, one major and one minor will be completed by the students under Mentor supervision.
Case Studies and Applications

  • Apply learning algorithms to building smart robots, text understanding, computer vision, medical informatics, audio, database mining, and other areas.

Learn from industry and academic experts




Graeme Malcom

Senior Content Developer, Microsoft

Gerry O'Brien

Senior Content Developer, Microsoft

Liberty J.Munson

Principal Psychometrician and Quality lead, Microsoft

Authman Apatira

Lead Intructor, Coding Dojo

Stephen Elston

Managing Director Quantia Analytics, LLC

Cynthia Rudin

Associate Professor MIT and Duke

Online Classroom

₹11,000

₹5,500 (50% OFF)

₹11000

  1. Online Portal

  2. Mentorship & Placement Mobilizer

  3. Access to Webinars

  4. Projects & Guranteed Internships

  5. Certification from Industry Partners

Hybrid Classroom

₹12,998

₹6,499 (50% OFF)

₹12998

  1. Duration: Offline: 5 days(includes Lunch)
    Online: 12 Month Access

  2. Placement Mobilizer

  3. Access to Webinars

  4. Projects and Guranteed Internships

  5. Certification from Industry Partners



Other Popular Courses