0
For best deals, Call us now
Use code: UY10 for 10% Flat discount
Buy 1 Get 2 Certifications free with Exam

Cybersecurity Certification Course (Virtual Instructor-led Training)

> Cybersecurity specialists have seen an average annual hiring growth rate of 30% year on year over the past 5 years - CNBC
> The average salary for a Cybersecurity Specialist is $110,881 per year in the United States and INR 900,000 per year in India - Indeed.com
> Global Cybersecurity industry is estimated to cross US$ 220 billion by 2021.

 

USD 389 USD 499

Course Overview

Cybersecurity Certification Course will help you in establishing a strong foundation towards your journey in the Cybersecurity domain.

Key Highlights

  • 24 Hours of Online Live Instructor-Led Classes
  • Weekend Class : 8 sessions of 3 hours each
  • Real-life Case Studies
  • Assignments
  • lifetime access to Learning Management System (LMS) 
  • 24 x 7 Expert Support
  • Certification
  • Community forum for all our customers
  • No Exam Included

What You'll Learn

  • Learning the basics of Cybersecurity
  • Understanding Cryptography
  • Learning about idAM
  • Understanding Application Security, Cloud Security
  • Learn about the practiced security processes for business

SCHEDULE

    • Delivery Format: Virtual Classroom Live
    • Location: Online
    • Access Period: 4 Weeks
    • Course Date: OCT 17 th
    • Course Time: 11:00 AM to 02:00 PM (EDT)
    • Session: Weekend
    • Total Class: SAT & SUN (8 Sessions)
    QTY
    USD 389 USD 499
    • Delivery Format: Virtual Classroom Live
    • Location: Online
    • Access Period: 4 Weeks
    • Course Date: NOV 13 th
    • Course Time: 09:30 PM to 12:30 AM (EDT)
    • Session: Weekdays
    • Total Class: FRI & SAT (8 Sessions)
    QTY
    USD 389 USD 499

Career Benefits

  • Career in Cybersecurity
  • Better opportunities
  • Increased Knowledge base

Who Can Attend

  • Any individual aspiring to work in the field of Cybersecurity
     

Exam Formats

 No exam included.

Course Delivery

This course is available in the following formats:

  • Virtual Classroom Live Duration: 24 Hrs

Related Courses

Course Syllabus


Security Essentials

Learning Objective: In this module, you will learn about the essential building blocks and basic concepts around cyber security such as Confidentiality, Integrity, Availability, Authentication, Authorization, Vulnerability, Threat & Risk and so on. In addition to these concepts, you will also explore the core topics such as Security Governance, Audit, Compliance and Security Architecture. 

 

Topics:

  • Need of Cyber Security
  • CIA Triad
  • Vulnerability, Threat and Risk
  • Risk Governance & Risk Management
  • Security Architecture
  • Security Governance
  • Security Auditing
  • Compliance
  • Computer Security Architecture & Design

 

Hands On/Demo::

  • Data Breaches
  • Internet Threat Scenario

Cryptography

Learning Objective: In this module you will learn, various forms of Cryptographic techniques, their pragmatic relevance & weaknesses. You will learn how cryptography, its components, methods and its usage are employed in the enterprise to store and transmit messages safely. 

 

Topics:

  • Background of Cryptography
  • Symmetric Cryptography
  • Data Encryption Standard (DES)
  • Triple-DES
  • The Advanced Encryption Standard (AES)
  • International Data Encryption Algorithm (IDEA)
  • Blowfish
  • RC4
  • RC5
  • RC6
  • Asymmetric Cryptography
  • The Diffie-Hellman Algorithm
  • RSA
  • Elliptic Curve Cryptosystems (ECC)
  • Cryptographic Hash Functions
  • Attacks against Encrypted Data
  • Digital Certificates and its Format (X.509, X.500)
  • Certificate Authority, Certificate Repository, Certificate Revocation lists
  • Digital Certificate life cycle (Initialize, Issue, Cancel)

 

Hands On/Demo::

  • Image Steganography
  • Hashing

Computer Networks & Security

Learning Objective: In this module, you will glance over various aspects related to Computer Networks and in-parallel delve into understanding the weaknesses & concepts around securing the networks. 

 

Topics:

  • Network architecture, protocols, and technologies: Layered architecture, Open Systems Interconnect (OSI) Model
  • Transmission Control Protocol/Internet Protocol (TCP/IP)
  • Hybrid TCP/IP Model
  • Application Layer Protocols: HTTP, SNMP, DNS, POP, SMTP
  • Transport layer protocols: Transmission Control Protocol (TCP), User Datagram Protocol (UDP)
  • Network/Internet layer protocols: Internet Protocol (IP) v4, IPv6, IPsec protocols
  • Link layer protocols: Address Resolution Protocol (ARP) / Reverse ARP / Proxy ARP, Ethernet, VLAN

 

Hands On/Demo::

  • Sniffer
  • IP Address

Application Security

Learning Objective: In this module, you learn the importance of Application level security. You will glance over various known application weaknesses, techniques to attack them and various controls/ solutions to these vulnerabilities. You will also get an overview of Secure SDLC methodology. 

 

Topics:

  • Importance of Application Security
  • OWASP Top 10 web application vulnerabilities
  • SSDLC (Secure Software Development Life Cycle)

 

Hands On/Demo::

  • SQL Injection
  • Buffer Overflow

Data & Endpoint Security

Learning Objective: In this module, you will glance over, various aspects related to data and endpoint (host) security. This being a primary need, is a very crucial topic. 

 

Topics:

  • Data Security
  • Data Security Controls
  • Endpoint Security
  • Host/ Endpoint Security Controls

 

Hands On/Demo::

  • Computer Monitoring
  • System Recovery

IdAM (Identity & Access Management)

Learning Objective: Identity and access management (IdAM) is the security discipline that enables the appropriate individuals to access the right resources at the right times for the right reasons. IdAM addresses the mission-critical need to ensure appropriate access to resources across increasingly heterogeneous technology environments, and to meet the increasingly rigorous compliance requirements. This security practice is a crucial undertaking for any enterprise. Enterprises that develop mature IAM capabilities can reduce their identity management costs and more importantly, become significantly more responsive in supporting new business initiatives.

 

In this module you will glance over, various aspects related to the principle of Identity & Access Management. This covers various intricacies around concepts of Authorization, Authentication, Identity & access management and its benefits to an enterprise. 

 

Topics:

  • Authorization
  • Authentication
  • Access Control
  • Privilege levels
  • IAM life cycle
  • Identity & Access Management Process and activities (Role Based, Single Sign on)

 

Hands On/Demo::

  • Password Management
  • Phishing

Cloud Security

Learning Objective: In this module you will glance over a vast topic of securing the cloud! You will first have an overview of types of cloud infrastructure and then delve into security concerns & potential solutions. 

 

Topics:

  • Cloud Computing Architectural Framework
  • Concerns & Best Practices
  • Governance and Enterprise Risk Management
  • Legal Issues: Contracts and Electronic Discovery
  • Compliance and Audit Management
  • Information Management and Data Security
  • Interoperability and Portability
  • Traditional Security, Business Continuity, and Disaster Recovery
  • Data Centre Operations
  • Incident Response
  • Application Security
  • Encryption and Key Management
  • Identity, Entitlement, and Access Management
  • Virtualization
  • Security as a Service

 

Hands On/Demo::

  • Virtual Machine
  • Cloud based Application Vulnerabilities

Phases of a Cyber Attack

Learning Objective:  In this module, you will gain an overview of the techniques & controls involved during various phases of a cyber-attack. 

 

Topics:

  • Phase 1 —Reconnaissance: Adversary identifies and selects a target
  • Phase 2 —Weaponize: Adversary packages an exploit into a payload designed to execute on the targeted computer/network
  • Phase 3 —Deliver: Adversary delivers the payload to the target system
  • Phase 4 —Exploit: Adversary code is executed on the target system
  • Phase 5 —Install: Adversary installs remote access software that provides a persistent presence within the targeted environment or system
  • Phase 6 —Command and Control: Adversary employs remote access mechanisms to establish a command and control channel with the compromised device
  • Phase 7 —Act on Objectives: Adversary pursues intended objectives e.g., data exfiltration, lateral movement to other targets

 

Hands On/Demo::

  • Footprinting
  • Scanning and Enumerating

Security Processes in practice for Businesses

Learning Objective: A business primarily is about making profits via achieving set targets and by catering best to customers and keeping shareholders and investors happy. This involves huge number of complex and interdependent discrete processes to run smoothly, efficiently and in a well monitored way. Today IT being one of the core enablers & also an increasingly major business platforms – threats are more than likely to cause enough disruption that may cause the business to derail completely. 

 

In this module we will glance over a variety of such business processes - to appreciate the relation, applicability and practicability of various information/ cyber security and risk management concepts that may be put in place to help the business stay predictable, safer and within a controlled cyber risk profile thereby enabling it to continue chasing its set targets. 

 

Topics:

  • Key Security Business Processes
  • Corp. & Security Governance
  • IT Strategy management
  • Portfolio/Program/Project management
  • Change management
  • Supplier (third party) management
  • Problem management
  • Knowledge management
  • Info-sec management
  • BCP
  • IT Operations management
  • Overview of top 20 security controls

 

Hands On/Demo::

  • Honeypot
  • Website Mirroring

Kubernetes Core Concepts and Networking

Learning Objective: Learn the basic concepts of Kubernetes and configure your Kubernetes network using calico.

Topics:

  • Kubernetes Core Concepts
  • Kubectl common commands
  • Understanding Pods
  • Configure network on cluster nodes
  • Pod Networking Concepts
  • Setting up a cluster - Kubernetes Certificates

Hands-On:

  • Perform basic kubectl commands
  • Deploy pods and use init containers to pre-set an environment
  • Configure Kubernetes network using Calico
  • Use certificates to authenticate resources

FAQ's


What if I miss a class?

"You will never miss a lecture at Upskill Yourself! You can choose either of the two options:

  • View the recorded session of the class available in your LMS.
  • You can attend the missed session, in any other live batch."

What if I have queries after I complete this course?

Your access to the Support Team is for lifetime and will be available 24/7. The team will help you in resolving queries, during and after the course.

Will I get placement assistance?

To help you in this endeavor, we have added a resume builder tool in your LMS. Now, you will be able to create a winning resume in just 3 easy steps. You will have unlimited access to use these templates across different roles and designations. All you need to do is, log in to your LMS and click on the "create your resume" option.


 

Is the course material accessible to the students even after the course training is over?

Yes, the access to the course material will be available for lifetime once you have enrolled into the course.

Mike Williams, Direct Consultant