Cyber Security Internship
Self-Paced
Fee: ₹999
Embark on a journey into the realm of cybersecurity with our intensive Cyber Security Internship. Delve deep into the intricacies of safeguarding digital assets and learn to navigate the evolving landscape of cyber threats. From mastering cybersecurity fundamentals to honing your entrepreneurial acumen, this internship provides a comprehensive foundation for a successful career in the cybersecurity industry.
Objectives
In this cybersecurity internship, you will embark on a journey to master cybersecurity essentials while nurturing an entrepreneurial mindset.
Develop core cybersecurity competencies integrated with entrepreneurial acumen.
Acquire specialized skills in threat detection and mitigation.
Cultivate expertise in securing networks and data assets.
Enhance proficiency in cybersecurity risk assessment and management.
Acquire Self-Paced Gain hands-on experience in cybersecurity tools and technologies.Strategies
What Will You Learn
Cybersecurity fundamentals and entrepreneurial principles, Market analysis and innovative solution conceptualization, Strategic thinking and problem-solving in cybersecurity, Hands-on experience in real-world cybersecurity projects.
Skills you will gain
Curriculum
-
Cyber Security
-
1 Introduction to Cyber Security
-
2 Why Cyber Security is Important?
-
3 Role of cyber security engineer
-
4 CIA Triad
-
5 The Hacking Methodology
-
6 The WhoIS Query
-
7 Social Engineering
-
8 Brute Force Attacks
-
9 Phishing
-
10 Bots and Botnets
-
11 DoS and DDoS
-
12 Ping Command
-
13 Man in the Middle Attacks (MITM)
-
14 Malicious Codes and Terminologies
-
15 Cybersecurity Breaches
-
16 Penetration Testing and Methodologies
-
17 Frameworks and Standards for Cybersecurity
-
18 Introduction to Networks and Reference Models
-
19 Hardware and Software Elements of Computer Systems
-
20 OSI layers
-
21 Network Devices
-
22 Packet Sniffing
-
23 Sniffing Using Scapy
-
24 Packet Spoofing
-
25 Packet Spoofing Using Scapy
-
26 Types of Hackers & Hacktivism Page
-
27 Vulnerability & Pen testing
-
28 Cyber Security Controls
-
29 Understanding Terminologies Page
-
30 Cyber Security Policies
-
31 CVE & CVSS. .Page
-
32 Attacks & Threats Page
-
33 Architecture & Design
-
34 Operations & Incident Response
-
35 Operations & Incident Response
-
36 Firewalls
-
37 Encryption
-
38 Biometrics
-
39 Anti Virus
-
40 Password Management
-
41 What is Cyber Kill Chain?
-
42 Reconnaissance and Weaponization
-
43 Delivery and Exploitation
-
44 Installation, Command and control (C2) & Actions on Objectives
-
45 Windows NT Architecture
-
46 File Permission in Windows
-
47 Managing Memory
-
48 Password Hashing & SAM
-
49 Windows Processes
-
50 Windows Registry
-
51 Introduction to PowerShell
-
52 Installing Windows Operating System in Virtual Box
-
-
Entrepreneurship Skills Program
-
1 Introduction to Entrepreneurship, Entrepreneurs and Entrepreneurial Competencies
-
2 Use of Problem Solution Fit Canvas
-
3 Basics of the problem solution fit canvas
-
4 Personalize The Canvas
-
5 What to write in "The Need-Problems" Box
-
6 What to write in Customer Segment Box
-
7 What to Write in "Triggers to Act Box
-
8 What to Write in "Emotions Before/After" box
-
9 What to write in "Available Solutions" Box
-
10 What to write in "Customer Limitations"
-
11 What to Write in "The Need-Behavior" Box
-
12 What to write in "Channels & Behavior" Box
-
13 What to Write in "Problem" box
-
14 What to Write in "Solutions" Box
-
15 Closing remarks
-
16 What to write in a "Problems That You Are Solving" box
-
17 Why Product Market Fit Canvas is Important
-
18 Basic No How of Product Market Fit
-
19 Let's personalize our Canvas
-
20 Step One of Product Market Fit Canvas
-
21 Step two of Product Market Fit Canvas
-
22 Step Three of Product Market Fit Canvas
-
23 Step Four of Product Market Fit Canvas
-
24 Step Five of Product Market Fit Canvas
-
25 Step Six of Product Market Fit Canvas
-
26 Step Seven of Product Market Fit Canvas
-
27 Step Eight of Key Matrices
-
28 Conclusion and Afterthoughts
-
29 Introduction of Business Model Canvas
-
30 Why Business Model Canvas is important ?
-
31 Personalization of Business Model Canvas
-
32 Value Proposition
-
33 Customer Segments
-
34 Customer Relationship
-
35 Channels
-
36 Key Resources
-
37 Key Partnership
-
38 Key Activities
-
39 Cost Stream
-
41 Revenue Stream
-
-
Project for Cyber Security Internship
Instructor
Dr. Priti Maheshwary
Dean at Future Skills Academy Scope Global Skills UniversityDean at Future Skills Academy Scope Global Skills University. Involved in Computer Science and Engineering for over 20 years in higher education and training. Her career has included various software development projects, teaching, research and administrative roles. She enjoys teaching and looking into how to improve student learning experience. Published around 50 research papers in refereed journals and conferences, 7 book chapters, 6 Patents. 8 PhD thesis completed under her guidance in the field of Internet of Things, Smart Cities, Ubiquitous Computing, Wireless Sensor Network, VANET, Image Processing specialized in Satellite Images, AI/ML & Deep Learning, and Cyber Security. Also done more than 10 projects in the field of Research and Consultancy.