Fundamentals of Cyber Security
Blended
Fee: ₹1,999
Throughout the course, students will learn about cyber security, the importance of cyber security, hacking methodologies, CIA Triads, different types of cyber-attacks, advanced networking, vulnerability, concepts of vulnerability, security basics like cyber defense, Operating systems, basics of Windows OS, Linux OS, Python scripting and so on.
Objectives
Develop a depth understanding of Cyber Security components like the Importance of Cyber Security, hacking, and cyber defense.
To make learners understand the basics of Cyber Security
To provide learners insights and practical knowledge on how to thwart cyber attacks
What Will You Learn
Upon its completion, you'll learn, how Cyber Security works, hacking methods, security basics.
Skills you will gain
Want to know more about our course?
Prepare for your career path
As a Cyber Security Analyst, you will thoroughly understand cyberattacks, malware, and the behavior of cyber criminals, and actively seeks to anticipate and prevent these attacks.
Key Skills to Learn
Cyber Security, Hacking Methodologies, Types of cyber attacks, cyber defense, OS
As a Cyber Security Architect, You will be responsible for planning, designing, testing, implementing and maintaining an organization's computer and network security infrastructure.
Key Skills to Learn
Knowledge of Windows, UNIX, and Linux. Understanding of ISO 27001/27002, ITIL, and COBIT frameworks. A grasp of perimeter security controls such as firewalls, IDS/IPS, network access controls, and network segmentation
Cyber Security engineers, sometimes called information security engineers, identify threats and vulnerabilities in systems and software, then apply their skills to developing and implementing high-tech solutions to defend against hacking, malware and ransomware, insider threats and all types of cybercrime
Key Skills to Learn
Cloud Security, Java, Windows, Incident Response, Firewalls, IoT Management, Database Knowledge, Linux
Jobs in India
35 L+
Average Salary
6 Lakhs
Job Growth
33%
Learn from the industry experts and stay ahead of the curve
Curriculum
-
Introduction to Cyber Security
-
Introduction0:07:15
-
Why Cyber Security is Important0:09:19
-
Role of Cyber Security Engineer0:10:58
-
CIA Triad0:07:00
-
The Hacking Methodology0:06:15
-
The WhoIS Query0:05:26
-
Social Engineering0:09:37
-
Brute Force Attacks0:04:21
-
Phishing0:10:53
-
Bots and Botnets0:10:30
-
DoS and DDoS0:05:10
-
Ping Command0:05:34
-
Man in the Middle Attacks (MITM)0:07:22
-
-
Cyber Security Building blocks
-
Malicious Codes and Terminologies0:08:20
-
Cyber Security Breaches0:09:10
-
Penetration Testing and Methodologies0:10:00
-
Frameworks and Standards for Cyber Security0:14:25
-
Hardware and Software Elements of Computer Systems0:05:11
-
Introduction to Networks and Reference Models0:15:02
-
OSI layers0:12:15
-
Network Protocol0:14:19
-
IP Address and Subnet Classes0:14:45
-
Network Devices0:12:10
-
Packet Sniffing0:10:45
-
Sniffing Using Scapy0:08:12
-
Packet Spoofing0:05:00
-
Packet Spoofing Using Scapy0:07:45
-
-
Live +Practical Sessions
-
Live +Practical Sessions01:30
-
-
Basic concepts of Vulnerability
-
Types of Hackers & Hacktivism0:07:12
-
Terminology0:11:19
-
Vulnerability Assessment & Pen testing0:10:12
-
Cyber Security Controls0:11:16
-
Cyber Security Policies0:12:45
-
CVE & CVSS0:10:12
-
-
Security Basics
-
Attacks & Threats0:12:11
-
Architecture & Design0:13:12
-
Implementation0:10:00
-
Operations & Incident Response0:15:00
-
Governance, Risk & Compliance0:12:34
-
Firewalls0:12:16
-
Encryption0:14:19
-
Biometrics0:15:00
-
Anti Virus0:09:10
-
Password Management0:07:56
-
What is Cyber Kill Chain0:13:15
-
Reconnaissance and Weaponization0:05:08
-
Delivery and Exploitation0:04:15
-
Installation, Command and control (C2) & Actions on Objectives0:05:05
-
-
Fundamentals Of Windows Operating Systems
-
Windows NT Architecture0:10:12
-
File System in Windows0:15:00
-
File Permission in Windows0:14:11
-
Managing Memory0:13:15
-
Password Hashing & SAM0:11:00
-
Windows Processes0:14:16
-
Windows Registry0:14:35
-
nstalling Windows Operating System in Virtual Box0:12:00
-
-
Live + Practical Sessions
-
Live + Practical Sessions01:30
-
-
Linux Basics
-
Overview of Operating System0:12:11
-
Working with Linux0:13:19
-
Linux Command Line Structure0:08:45
-
Sample Command Application0:13:43
-
Linux Directory Structure0:12:34
-
Flavors of Linux OS0:08:56
-
Linux File System & Directories0:09:49
-
Introduction to Kali Linux0:15:00
-
Installing Kali Linux in Virtual Box0:13:00
-
Managing Users & Groups0:16:22
-
Managing SSH in Kali Linux0:12:54
-
Hypervisors - Virtual Box, VMware0:12:08
-
Tools Covered - Python, Linux0:11:13
-
-
Python Scripting
-
Introduction to Python0.10:33
-
Python Execution and Installation0.:09:12
-
Identifiers, Variables and Datatypes0.11:19
-
Operators0:17:23
-
Python - Flow Controls0:12:00
-
Functions0:14:45
-
Python Classes0:13:12
-
Inheritance, Files0:17:34
-
Python - File Handling, API Programming0:16:11
-
Python - Important Modules0:15:14
-
Project 1 - Port Scanner0:13:12
-
Project 2 - Keylogger0:18:10
-
-
Live + Practical Sessions
-
Live +Practical Sessions01:30
-
-
Firewalls
-
Firewalls – Host-Based, Network - Based and Virtual0:13:14
-
Windows - Host-Based, Firewalls - Windows Firewall0:15:11
-
-
Live +Practical Sessions
-
Live +Practical Sessions01:30
-
-
How We Are Tracked And Targeted Online
-
Types of Tracking0:10:00
-
IP Address0:07:00
-
3rd Party Connections0:05:00
-
HTTP Referrer0:05:00
-
Cookies and Scripts0:03:00
-
Super Cookies0:02:00
-
rowser Fingerprinting and Browser Volunteered Information0:03:00
-
Browser and Browser Functionality0:03:00
-
More Tracking0:02:00
-
Browsing in Incognito Mode0:04:00
-
Browser and Internet Profiling0:03:00
-
Instructor
Ajay Gautam
Cyber Security ExpertHad done Advanced Certificate program on Cyber Defense by IIT Jodhpur. Cybersecurity bootcamp aligned with Singapore skills framework and NICE framework. Trained Indian Power sector officials in collaboration with NPTI. Trained IIT Jodhpur B.tech students about IDPS. Conducted corporate training to secure cyber-physical systems, Tech Mahindra. Developed Cyber range for Indian Army.
Dr. Priti Maheshwary
Professor at Future Skills AcademyPresently working in Future Skill Academy. Involved in Computer Science and Engineering for over 20 years in higher education and training. Her career has included various software development projects, teaching, research and administrative roles. She enjoys teaching and looking into how to improve student learning experience. Published around 50 research papers in refereed journals and conferences, 7 book chapters, 6 Patents. 8 PhD thesis completed under her guidance in the field of Internet of Things, Smart Cities, Ubiquitous Computing, Wireless Sensor Network, VANET, Image Processing specialized in Satellite Images, AI/ML & Deep Learning, and Cyber Security. Also done more than 10 projects in the field of Research and Consultancy.
Still have queries? Talk to our counselors who are available to guide you.
Shareable Certificate
Other Details
Get Job Assurance and JumpStart your career in Cyber Security
FAQs
-
Does this course include a certificate?
Yes, this course includes a certificate
-
Does this course has lifetime access or limited period access?
This course comes with the 1-year access
-
Does this course available in its complete version?
Yes, also you can do other specialized certification courses in Cyber Security
-
Does this course available in Hindi Version as well?
No, But this course will be available in the Hindi language soon on the AISECT Learn platform
-
What are the advantages of this course?
The learners who are willing to start their journey in Cyber Security and want to learn how they can manage themselves and their organization against cyber threats