You are on page 1of 4
Cyber Security Cyber Security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It is also known as information technology security or electronic information security. Our work lives, personal lives, and finances have largely gravitated toward the world of the intemet, mobile computing, and electronic media. Unfortunately, this widespread phenomenon makes us more vulnerable than ever to malicious attacks, invasions of privacy, fraud, and other unpleasantries. This makes Cyber Security a vital part of a secure and well-ordered digital world. It keeps us safe from hackers, cybercriminals, and other agents of fraud Ready for Cyber Security [WIP - Curate content and upload to iON LMS to provide access and track progress ] This course aims to provide basic concepts of cyber security to everyone. Aim is to generate interest among students in this fast growing field, This is a self paced course that introduces leamers to the world of information and network security, device security, cyber laws, social engineering, identity management and most importantly career prospects in cyber security Leamers who are completing this course, will be eligible to complete cybershikshaa+ training or can prepare themselves for Microsoft Certified: Security, Compliance, and Identity Fundamentals(SC-900). Module Topics ~Leaming Hours Digital safety | * Leam how to protect yourself 7 essentials for | How to handle cyberbullies teachers and | Cyber risk and how to avoid them students ¢ How to be a good digital citizen Introduction to What is Information Technology 4 Information Who uses Information Technology Security What is Information Security Why it’s a excellent career option Important Points about Information Security Privacy and Pil What are the consequences due to lack of Information Security practices Fundamentals of Information Security What is Cyber Security # Difference between Information Security and Cyber Security © Why attack takes place Irony of Information Security Awareness Issue in Digital world ‘© Who can be threat to Information Security ¢ Why the attacks and breaches takes place Why the attacks and breaches succeed Intellectual Property concept ‘Some astonishing facts and figures Why you should attend the course Introduction to Hacking Concept of Hacking Hacking the Real Terminology History of Hacking What is prone to attacks What are different attack vectors Which activities can be done using hacking Types of Malware Ransomware Who are Hackers ‘Some Well known hackers and their amazing ideas, Types of Hackers Understanding Blue Team versus Red Team Pen-testing Concept Hacking Frameworks Easy to Understanding Hacking model Why Hacking Succeed Understandinge Information Security related terminologies ‘Some Well known Attacks and Breaches Understanding Network Hacking and protection concepts What is Network Understanding TCP/IP Suite IP addressing Schemes Basics of DNS Network Vulnerability Type of Network Attacks Network Monitoring Network Security Measures Understanding Backup Understanding Web Application Security What is Web Application Web Application Architecture What is Web Application Security Web Application and Software Security Issues Web Application Risk Web Application Protection Methods Social Engineering Attacks What is Social Engineering ‘Some Social Engineering Statistics Social Engineering Attack Vectors Phishing concepts and Types Use of Social Media in Social Engineering Safeguard against Social Engineering Mobile Devices Understanding Mobile devices usage in the Digital world Issues and protection mechanisms Mobile device vulnerabilities Mobile Devices Threats Mobile Malwares Mobile Devices and associated Risk Mobile Device Precautions Mobile Devices Protection in organizations Understanding Incident Management What is Incident in Information Security What is Incidence Response Incident Response Considerations Understanding SIEM Understanding SOC Incident Response preparation and Planning Responding to Incident Departments and Teams roles Cryptography Introduction to Cryptography Cryptographic Functions. Cryptographic Methods ‘Symmetric Cryptography Asymmetric Cryptography Understanding PKI Understanding Digital Certificates Understanding Digital Signature Understanding Hashing Concepts Identity and Access Management What is IAM Objectives of IAM Importance of JAM Features of IAM Types of Access Control Models Implementation of AM Understanding BCP and DR Fundamentals Concept of BCP Concept of DR: Why is BCP-DR required ? BCP and DR Considerations Addressing BCP and DR Understanding Cyber Forensics What is Cyber Forensics Locard's exchange principle Types of Cyber Forensics Cyber Forensic Challenges Digital Forensics Cautions ital Forensic procedures Mobile Device Investigation Forensic Preservation Evidence Sources Evidence Handling Cyber Crimes What is Cyber Crime and Cyber Laws Who are the targets of Cyber Crimes Types of Cyber crimes Organized Crime sector ‘Some Cyber Crime statistics Agencies dealing with Cyber security and Cyber Crimes Initiatives by Indian Government IT Act 2000 IT Act 2000 - objectives Adjudication, Penalties and Compensation Career © Career Prospects Prospects and © SOC Analyst Certifications © Vulnerability Assessor > Security Auditor o Cryptographer © Security Architect © Cyber Security Consultant © Techno-Legal Consultant © Pen-Tester Engineer © Cyber Lawyers © Computer Crime Investigator © Forensic Analyst © Network Security Engineer © Disaster Recovery/Business Continuity Manager ° CISO © Microsoft Certifications © Security, Compliance, and Identity Fundamentals © Azure Security Engineer Associate © Security Administrator Associate © Security Administrator Associate © Security Operations Analyst Associate © Identity and Access Administrator Associate © Information Protection Administrator Associate © Cybersecurity Architect Expert © Security Administrator Associate © Security Operations Analyst Associate © Identity and Access Administrator Associate © Information Protection Administrator Associate © Cybersecurity Architect Expert Assessments | © Module assessments © Summative assessment

You might also like