Cybersecurity refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cybersecurity may also be referred to as information technology security.
Cybersecurity doesn’t involve just businesses and the government. Your computer, tablet and cellphone probably contain information that hackers and other criminals would love to have, like other people’s email addresses, names and birthdates. Suppose, for example, a hacker had access to your contact information. He could then send an email or text message to everyone you know, using your name, encouraging them to click on a link containing malware, like “Hey Jane, I thought you’d love this! Click here.”
This course is designed in a way to give you an insight into all the aspect of cybersecurity and at the same time, we make sure that you get the hands-on experience. The course consists of Dark Web, Web Security, Cryptography, Network Security, Malware, Operating System Security, Social Engineering, Memory attacks, Zero Day attacks. We will deal with the theory and will then move to the practical part.
The course will have some hacking challenges as assignments. Those will be unlocked over the period of the course. It is a self-paced course for you to take onto. But we recommend spending at least a 6-8 hours per week on the course. You can always ask the questions in the forum and that will be answered by the experts. After every few weeks, there will be live QNA sections regarding the course which you can attend and ask any question that you have to the instructor.
Job scenarios in Cybersecurity
Cybersecurity is very obviously a job sector of the future. Official estimates put job growth in the sector at 37% per year at least through 2022 – and that is probably conservative. At the start of this year there were an estimated half million cybersecurity jobs unfilled in the U.S. alone.
That’s the good news. It’s also the bad news, for society. Because the main reason it is a job of the future is because the cyber risks of a connected world keep expanding and getting more threatening.
It’s now so last year – even last five years – to refer to the Internet of Things (IoT). It is now, or soon will be, the Internet of Everything (IoE). Encryption guru, author, blogger and CTO at IBM Resilient Bruce Schneier calls it Internet+ (short for Internet+Things+Us) in his most recent book, “Click Here to Kill Everybody.”
It is a world where pretty much everything and everybody – individuals, companies, governments, critical infrastructure – are increasingly dependent on connected systems, networks, and devices.
The course is updated based on the changing technology in that field. This makes sure that you keep your cybersecurity knowledge updated. Also every now and then all the students will participate in CTF competitions which are hacking competitions and the instructor will help in sharing the details about the challenges and how one should approach them.
For workshops you can fill up this form and our team will contact you.
|Introduction to Cyber Security|
|History of cyber security||00:00:00|
|Modern Day Hacking||00:00:00|
|Overview of the common attacks||00:00:00|
|Types of Security||00:00:00|
|What is Dark Net||00:00:00|
|What is Deep Web ?||00:00:00|
|Legal vs Illegal||00:00:00|
|How does normal internet works||00:00:00|
|What is Onion Routing and Tor||00:00:00|
|Tor installation in Windows||00:00:00|
|Tor installation in Linux Mint||00:00:00|
|Tor installation in MacOS||00:00:00|
|Creating your own VPN||00:00:00|
|Exploring Dark Web||00:00:00|
|What you should not do||00:00:00|
|Creating a small website with payment option||00:00:00|
|Hosting up Website||00:00:00|
|Creating Dark Web Email||00:00:00|
|Staying Completely Anonymous||00:00:00|
|Is Darknet dangerous||00:00:00|
|What is OWASP?||00:00:00|
|Installing Kali Linux||00:00:00|
|OWASP Top 10 list||00:00:00|
|Installation of DVWA||00:00:00|
|Injection attacks and types||00:00:00|
|Blind SQL injection||00:00:00|
|OS Command Injection||00:00:00|
|Command Line injection||00:00:00|
|Broken Authentication Countermeasures||00:00:00|
|Sensitive Data Exposure||00:00:00|
|Sensitive Data Exposure – Case Study||00:00:00|
|Sensitive Data Exposure Countermeasures||00:00:00|
|XML External Entities||00:00:00|
|Broken Access Control||00:00:00|
|Broken Access Control Countermeasures||00:00:00|
|Security Misconfiguration Countermeasures||00:00:00|
|DOM based XSS||00:00:00|
|Insecure Deserialization Countermeasures||00:00:00|
|Using Components With Known Vulnerabilities||00:00:00|
|Using Component With Known Vulnerabilities – Countermeasures||00:00:00|
|Insufficient Logging and Monitoring||00:00:00|
|Symmetric Key Encryption||00:00:00|
|Asymmetric Key Encryption||00:00:00|
|Memory Corruption Attacks|
|Understanding Basics (Stack and Heaps)||00:00:00|
|Basics of Networking and its tools||00:00:00|
|Denial of Service Attacks (DOS)||00:00:00|
|Distributed Denial of Service Attacks (DDOS)||00:00:00|
|TCP Connection Hijacking||00:00:00|
|DNS Cache Poisoning||00:00:00|
|Man in the Middle Attack||00:00:00|
|Breaking into Wireless Security||00:00:00|
|Operating System Security|
|Overview Of Windows Security||00:00:00|
|Overview of Unix Security||00:00:00|
|Password Cracking – Both linux and windows||00:00:00|
|Looking into some of the CVE||00:00:00|
|History of Malware||00:00:00|
|Types of Malware||00:00:00|
No Reviews found for this course.