Cyber Security Certificate Course
Self-Paced
Fee: ₹699
Throughout the course, students will learn about cyber security, the importance of cyber security, hacking methodologies, CIA Triads, different types of cyber-attacks, advanced networking, vulnerability, concepts of vulnerability, security basics like cyber defense, Operating systems, basics of Windows OS, Linux OS, Python scripting and so on.
Objectives
Develop a depth understanding of Cyber Security components like the Importance of Cyber Security, hacking, and cyber defense.
To make learners understand the basics of Cyber Security
To provide learners insights and practical knowledge on how to thwart cyber attacks
What Will You Learn
Upon its completion, you'll learn, how Cyber Security works, hacking methods, security basics.
Skills you will gain
Want to know more about our course?
Prepare for your career path
As a Cyber Security Analyst, you will thoroughly understand cyberattacks, malware, and the behavior of cyber criminals, and actively seeks to anticipate and prevent these attacks.
Key Skills to Learn
Cyber Security, Hacking Methodologies, Types of cyber attacks, cyber defense, OS
As a Cyber Security Architect, You will be responsible for planning, designing, testing, implementing and maintaining an organization's computer and network security infrastructure.
Key Skills to Learn
Knowledge of Windows, UNIX, and Linux. Understanding of ISO 27001/27002, ITIL, and COBIT frameworks. A grasp of perimeter security controls such as firewalls, IDS/IPS, network access controls, and network segmentation
Cyber Security engineers, sometimes called information security engineers, identify threats and vulnerabilities in systems and software, then apply their skills to developing and implementing high-tech solutions to defend against hacking, malware and ransomware, insider threats and all types of cybercrime
Key Skills to Learn
Cloud Security, Java, Windows, Incident Response, Firewalls, IoT Management, Database Knowledge, Linux
Jobs in India
35 L+
Average Salary
6 Lakhs
Job Growth
33%
Learn from the industry experts and stay ahead of the curve
Curriculum
-
Introduction to Cyber Security
-
Introduction
-
Why Cyber Security is Important
-
Role of Cyber Security Engineer
-
CIA Triad
-
The Hacking Methodology
-
The WhoIS Query
-
Social Engineering
-
Brute Force Attacks
-
Phishing
-
Bots and Botnets
-
DoS and DDoS
-
Ping Command
-
Man in the Middle Attacks (MITM)
-
-
Cyber Security Building blocks
-
Malicious Codes and Terminologies
-
Cyber Security Breaches
-
Penetration Testing and Methodologies
-
Frameworks and Standards for Cyber Security
-
Hardware and Software Elements of Computer Systems
-
Introduction to Networks and Reference Models
-
OSI layers
-
Network Protocol
-
IP Address and Subnet Classes
-
Network Devices
-
Packet Sniffing
-
Sniffing Using Scapy
-
Packet Spoofing
-
Packet Spoofing Using Scapy
-
-
Basic concepts of Vulnerability
-
Types of Hackers & Hacktivism
-
Terminology
-
Vulnerability Assessment & Pen testing
-
Cyber Security Controls
-
Cyber Security Policies
-
CVE & CVSS
-
-
Security Basics
-
Attacks & Threats
-
Architecture & Design
-
Implementation
-
Operations & Incident Response
-
Governance, Risk & Compliance
-
Firewalls
-
Encryption
-
Biometrics
-
Anti Virus
-
Password Management
-
What is Cyber Kill Chain
-
Reconnaissance and Weaponization
-
Delivery and Exploitation
-
Installation, Command and control (C2) & Actions on Objectives
-
-
Fundamentals of Windows Operating Systems
-
Windows NT Architecture
-
File System in Windows
-
File Permission in Windows
-
Managing Memory
-
Password Hashing & SAM
-
Windows Processes
-
Windows Registry
-
Installing Windows Operating System in Virtual Box
-
-
Linux Basics
-
Overview of Operating System
-
Working with Linux
-
Linux Command Line Structure
-
Sample Command Application
-
Linux Directory Structure
-
Flavors of Linux OS
-
Linux File System & Directories
-
Introduction to Kali Linux
-
Installing Kali Linux in Virtual Box
-
Managing Users & Groups
-
Managing SSH in Kali Linux
-
Hypervisors - Virtual Box, VMware
-
Tools Covered - Python, Linux
-
-
Python Scripting
-
Introduction to Python
-
Python Execution and Installation
-
Identifiers, Variables and Datatypes
-
Operators
-
Python - Flow Controls
-
Functions
-
Python Classes
-
Inheritance, Files
-
Python - File Handling, API Programming
-
Python - Important Modules
-
Project 1 - Port Scanner
-
Project 2 - Keylogger
-
-
Virtual Private Network (VPN)
-
Introduction
-
Why VPN, Analogy and Tunneling
-
-
Firewalls
-
Firewalls – Host-Based, Network - Based and Virtual
-
Windows - Host-Based, Firewalls - Windows Firewall
-
-
How we are tracked and targeted online
-
Types of Tracking
-
IP Address
-
3rd Party Connections
-
HTTP Referrer
-
Cookies and Scripts
-
Super Cookies
-
Browser Fingerprinting and Browser Volunteered Information
-
Browser and Browser Functionality
-
More Tracking
-
Browsing in Incognito Mode
-
Browser and Internet Profiling
-
Instructor
Ajay Gautam
Cyber Security ExpertHad done Advanced Certificate program on Cyber Defense by IIT Jodhpur. Cybersecurity bootcamp aligned with Singapore skills framework and NICE framework. Trained Indian Power sector officials in collaboration with NPTI. Trained IIT Jodhpur B.tech students about IDPS. Conducted corporate training to secure cyber-physical systems, Tech Mahindra. Developed Cyber range for Indian Army.
Dr. Priti Maheshwary
Professor at Future Skills AcademyPresently working in Future Skill Academy. Involved in Computer Science and Engineering for over 20 years in higher education and training. Her career has included various software development projects, teaching, research and administrative roles. She enjoys teaching and looking into how to improve student learning experience. Published around 50 research papers in refereed journals and conferences, 7 book chapters, 6 Patents. 8 PhD thesis completed under her guidance in the field of Internet of Things, Smart Cities, Ubiquitous Computing, Wireless Sensor Network, VANET, Image Processing specialized in Satellite Images, AI/ML & Deep Learning, and Cyber Security. Also done more than 10 projects in the field of Research and Consultancy.
Still have queries? Talk to our counselors who are available to guide you.
Shareable Certificate
Other Details
Get Job Assurance and JumpStart your career in Cyber Security
FAQs
-
Does this course include a certificate?
Yes, this course includes a certificate
-
Does this course has lifetime access or limited period access?
This course comes with the 1-year access
-
Does this course available in its complete version?
Yes, also you can do other specialized certification courses in Cyber Security
-
Does this course available in Hindi Version as well?
No, But this course will be available in the Hindi language soon on the AISECT Learn platform
-
What are the advantages of this course?
The learners who are willing to start their journey in Cyber Security and want to learn how they can manage themselves and their organization against cyber threats