Fundamentals of Cyber Security
Blended
Fee: ₹1,999
 Ajay Gautam | Cyber Security Expert
                                                                                                                            Ajay Gautam | Cyber Security Expert
                                                                                
                                    Throughout the course, students will learn about cyber security, the importance of cyber security, hacking methodologies, CIA Triads, different types of cyber-attacks, advanced networking, vulnerability, concepts of vulnerability, security basics like cyber defense, Operating systems, basics of Windows OS, Linux OS, Python scripting and so on.
Objectives
Develop a depth understanding of Cyber Security components like the Importance of Cyber Security, hacking, and cyber defense.
To make learners understand the basics of Cyber Security
To provide learners insights and practical knowledge on how to thwart cyber attacks
What Will You Learn
Upon its completion, you'll learn, how Cyber Security works, hacking methods, security basics.
Skills you will gain
Want to know more about our course?
Prepare for your career path
As a Cyber Security Analyst, you will thoroughly understand cyberattacks, malware, and the behavior of cyber criminals, and actively seeks to anticipate and prevent these attacks.
Key Skills to Learn
Cyber Security, Hacking Methodologies, Types of cyber attacks, cyber defense, OS
As a Cyber Security Architect, You will be responsible for planning, designing, testing, implementing and maintaining an organization's computer and network security infrastructure.
Key Skills to Learn
Knowledge of Windows, UNIX, and Linux. Understanding of ISO 27001/27002, ITIL, and COBIT frameworks. A grasp of perimeter security controls such as firewalls, IDS/IPS, network access controls, and network segmentation
Cyber Security engineers, sometimes called information security engineers, identify threats and vulnerabilities in systems and software, then apply their skills to developing and implementing high-tech solutions to defend against hacking, malware and ransomware, insider threats and all types of cybercrime
Key Skills to Learn
Cloud Security, Java, Windows, Incident Response, Firewalls, IoT Management, Database Knowledge, Linux
Jobs in India
 
                                                                    35 L+
Average Salary
 
                                                                    6 Lakhs
Job Growth
 
                                                        33%
Learn from the industry experts and stay ahead of the curve
 
                                                                                             
                                                                                             
                                                                                             
                                                                                             
                                                                                             and many more
                                                                                                                                                                        and many more
                                                                            Curriculum
- 
                                                            Introduction to Cyber Security- 
                                                                                 Introduction Introduction
- 
                                                                                 Why Cyber Security is Important Why Cyber Security is Important
- 
                                                                                 Role of Cyber Security Engineer Role of Cyber Security Engineer
- 
                                                                                 CIA Triad CIA Triad
- 
                                                                                 The Hacking Methodology The Hacking Methodology
- 
                                                                                 The WhoIS Query The WhoIS Query
- 
                                                                                 Social Engineering Social Engineering
- 
                                                                                 Brute Force Attacks Brute Force Attacks
- 
                                                                                 Phishing Phishing
- 
                                                                                 Bots and Botnets Bots and Botnets
- 
                                                                                 DoS and DDoS DoS and DDoS
- 
                                                                                 Ping Command Ping Command
- 
                                                                                 Man in the Middle Attacks (MITM) Man in the Middle Attacks (MITM)
 
- 
                                                                                
- 
                                                            Cyber Security Building blocks- 
                                                                                 Malicious Codes and Terminologies Malicious Codes and Terminologies
- 
                                                                                 Cyber Security Breaches Cyber Security Breaches
- 
                                                                                 Penetration Testing and Methodologies Penetration Testing and Methodologies
- 
                                                                                 Frameworks and Standards for Cyber Security Frameworks and Standards for Cyber Security
- 
                                                                                 Hardware and Software Elements of Computer Systems Hardware and Software Elements of Computer Systems
- 
                                                                                 Introduction to Networks and Reference Models Introduction to Networks and Reference Models
- 
                                                                                 OSI layers OSI layers
- 
                                                                                 Network Protocol Network Protocol
- 
                                                                                 IP Address and Subnet Classes IP Address and Subnet Classes
- 
                                                                                 Network Devices Network Devices
- 
                                                                                 Packet Sniffing Packet Sniffing
- 
                                                                                 Sniffing Using Scapy Sniffing Using Scapy
- 
                                                                                 Packet Spoofing Packet Spoofing
- 
                                                                                 Packet Spoofing Using Scapy Packet Spoofing Using Scapy
 
- 
                                                                                
- 
                                                            Live +Practical Sessions- 
                                                                                 Live +Practical Sessions Live +Practical Sessions
 
- 
                                                                                
- 
                                                            Basic concepts of Vulnerability- 
                                                                                 Types of Hackers & Hacktivism Types of Hackers & Hacktivism
- 
                                                                                 Terminology Terminology
- 
                                                                                 Vulnerability Assessment & Pen testing Vulnerability Assessment & Pen testing
- 
                                                                                 Cyber Security Controls Cyber Security Controls
- 
                                                                                 Cyber Security Policies Cyber Security Policies
- 
                                                                                 CVE & CVSS CVE & CVSS
 
- 
                                                                                
- 
                                                            Security Basics- 
                                                                                 Attacks & Threats Attacks & Threats
- 
                                                                                 Architecture & Design Architecture & Design
- 
                                                                                 Implementation Implementation
- 
                                                                                 Operations & Incident Response Operations & Incident Response
- 
                                                                                 Governance, Risk & Compliance Governance, Risk & Compliance
- 
                                                                                 Firewalls Firewalls
- 
                                                                                 Encryption Encryption
- 
                                                                                 Biometrics Biometrics
- 
                                                                                 Anti Virus Anti Virus
- 
                                                                                 Password Management Password Management
- 
                                                                                 What is Cyber Kill Chain What is Cyber Kill Chain
- 
                                                                                 Reconnaissance and Weaponization Reconnaissance and Weaponization
- 
                                                                                 Delivery and Exploitation Delivery and Exploitation
- 
                                                                                 Installation, Command and control (C2) & Actions on Objectives Installation, Command and control (C2) & Actions on Objectives
 
- 
                                                                                
- 
                                                            Fundamentals Of Windows Operating Systems- 
                                                                                 Windows NT Architecture Windows NT Architecture
- 
                                                                                 File System in Windows File System in Windows
- 
                                                                                 File Permission in Windows File Permission in Windows
- 
                                                                                 Managing Memory Managing Memory
- 
                                                                                 Password Hashing & SAM Password Hashing & SAM
- 
                                                                                 Windows Processes Windows Processes
- 
                                                                                 Windows Registry Windows Registry
- 
                                                                                 nstalling Windows Operating System in Virtual Box nstalling Windows Operating System in Virtual Box
 
- 
                                                                                
- 
                                                            Live + Practical Sessions- 
                                                                                 Live + Practical Sessions Live + Practical Sessions
 
- 
                                                                                
- 
                                                            Linux Basics- 
                                                                                 Overview of Operating System Overview of Operating System
- 
                                                                                 Working with Linux Working with Linux
- 
                                                                                 Linux Command Line Structure Linux Command Line Structure
- 
                                                                                 Sample Command Application Sample Command Application
- 
                                                                                 Linux Directory Structure Linux Directory Structure
- 
                                                                                 Flavors of Linux OS Flavors of Linux OS
- 
                                                                                 Linux File System & Directories Linux File System & Directories
- 
                                                                                 Introduction to Kali Linux Introduction to Kali Linux
- 
                                                                                 Installing Kali Linux in Virtual Box Installing Kali Linux in Virtual Box
- 
                                                                                 Managing Users & Groups Managing Users & Groups
- 
                                                                                 Managing SSH in Kali Linux Managing SSH in Kali Linux
- 
                                                                                 Hypervisors - Virtual Box, VMware Hypervisors - Virtual Box, VMware
- 
                                                                                 Tools Covered - Python, Linux Tools Covered - Python, Linux
 
- 
                                                                                
- 
                                                            Python Scripting- 
                                                                                 Introduction to Python Introduction to Python
- 
                                                                                 Python Execution and Installation Python Execution and Installation
- 
                                                                                 Identifiers, Variables and Datatypes Identifiers, Variables and Datatypes
- 
                                                                                 Operators Operators
- 
                                                                                 Python - Flow Controls Python - Flow Controls
- 
                                                                                 Functions Functions
- 
                                                                                 Python Classes Python Classes
- 
                                                                                 Inheritance, Files Inheritance, Files
- 
                                                                                 Python - File Handling, API Programming Python - File Handling, API Programming
- 
                                                                                 Python - Important Modules Python - Important Modules
- 
                                                                                 Project 1 - Port Scanner Project 1 - Port Scanner
- 
                                                                                 Project 2 - Keylogger Project 2 - Keylogger
 
- 
                                                                                
- 
                                                            Live + Practical Sessions- 
                                                                                 Live +Practical Sessions Live +Practical Sessions
 
- 
                                                                                
- 
                                                            Firewalls- 
                                                                                 Firewalls – Host-Based, Network - Based and Virtual Firewalls – Host-Based, Network - Based and Virtual
- 
                                                                                 Windows - Host-Based, Firewalls - Windows Firewall Windows - Host-Based, Firewalls - Windows Firewall
 
- 
                                                                                
- 
                                                            Live +Practical Sessions- 
                                                                                 Live +Practical Sessions Live +Practical Sessions
 
- 
                                                                                
- 
                                                            How We Are Tracked And Targeted Online- 
                                                                                 Types of Tracking Types of Tracking
- 
                                                                                 IP Address IP Address
- 
                                                                                 3rd Party Connections 3rd Party Connections
- 
                                                                                 HTTP Referrer HTTP Referrer
- 
                                                                                 Cookies and Scripts Cookies and Scripts
- 
                                                                                 Super Cookies Super Cookies
- 
                                                                                 rowser Fingerprinting and Browser Volunteered Information rowser Fingerprinting and Browser Volunteered Information
- 
                                                                                 Browser and Browser Functionality Browser and Browser Functionality
- 
                                                                                 More Tracking More Tracking
- 
                                                                                 Browsing in Incognito Mode Browsing in Incognito Mode
- 
                                                                                 Browser and Internet Profiling Browser and Internet Profiling
 
- 
                                                                                
Instructor
 
                                                                                                                    Ajay Gautam
Cyber Security ExpertHad done Advanced Certificate program on Cyber Defense by IIT Jodhpur. Cybersecurity bootcamp aligned with Singapore skills framework and NICE framework. Trained Indian Power sector officials in collaboration with NPTI. Trained IIT Jodhpur B.tech students about IDPS. Conducted corporate training to secure cyber-physical systems, Tech Mahindra. Developed Cyber range for Indian Army.
 
                                                                                                                    Dr. Priti Maheshwary
Professor at Future Skills AcademyPresently working in Future Skill Academy. Involved in Computer Science and Engineering for over 20 years in higher education and training. Her career has included various software development projects, teaching, research and administrative roles. She enjoys teaching and looking into how to improve student learning experience. Published around 50 research papers in refereed journals and conferences, 7 book chapters, 6 Patents. 8 PhD thesis completed under her guidance in the field of Internet of Things, Smart Cities, Ubiquitous Computing, Wireless Sensor Network, VANET, Image Processing specialized in Satellite Images, AI/ML & Deep Learning, and Cyber Security. Also done more than 10 projects in the field of Research and Consultancy.
Still have queries? Talk to our counselors who are available to guide you.
Shareable Certificate
 
                                                                    Other Details
 Level
                                                        Level                                                     Start Date
                                                        Start Date                                                     Credentials
                                                        Credentials                                                    Get Job Assurance and JumpStart your career in Cyber Security
 
                                                             
                                                             
                                                             
                                                             
                                                            FAQs
- 
                                                        Does this course include a certificate?Yes, this course includes a certificate 
- 
                                                        Does this course has lifetime access or limited period access?This course comes with the 1-year access 
- 
                                                        Does this course available in its complete version?Yes, also you can do other specialized certification courses in Cyber Security 
- 
                                                        Does this course available in Hindi Version as well?No, But this course will be available in the Hindi language soon on the AISECT Learn platform 
- 
                                                        What are the advantages of this course?The learners who are willing to start their journey in Cyber Security and want to learn how they can manage themselves and their organization against cyber threats 
Learner's Ratings
Are you happy to learn with us?
You must be logged in to write a review.
Reviews
No reviews yet.
Associated Courses
 Instructor:
                                                Instructor:
                                             Duration:
                                                Duration:
                                             Course Credit:
                                                Course Credit:
                                             Videos:
                                                Videos:
                                             Certification Body:
                                                Certification Body:
                                             Placement Training:
                                                Placement Training:
                                             Language:
                                                Language:
                                             Access:
                                                Access:
                                             Shareable Certificate:
                                                Shareable Certificate:
                                            