Security Essentials
1
Learn about the intrinsic concepts around Cyber Security such as Availability, Authentication, confidentiality, integrity, Authorization, Vulnerability, Threat & Risk, and many more. Study the core topics like Security Governance, Audit, Compliance, and Security Architecture.
Topics:
- The need of Cyber Security
- CIA Triad
- Vulnerability, Threat, and Risk
- Risk Governance & Risk Management
- Security Architecture
- Security Governance
- Security Auditing
- Compliance
- Computer Security Architecture & Design
Cryptography
1
Study the various cryptographic techniques, its relevance, and weakness. Learn about the methodology and how to transmit messages in an enterprise safely.
Topics:
- Background of Cryptography
- Symmetric Cryptography
- Data Encryption Standard (DES)
- Triple-DES
- The Advanced Encryption Standard (AES)
- International Data Encryption Algorithm (IDEA)
- Blowfish
- RC4
- RC5
- RC6
- Asymmetric Cryptography
- The Diffie-Hellman Algorithm
- RSA
- Elliptic Curve Cryptosystems (ECC)
- Cryptographic Hash Functions
- Attacks against Encrypted Data
- Digital Certificates and the Format of DC (X.509, X.500)
- Certificate Authority, Certificate Revocation lists, Certificate Repository
- Digital Certificate life cycle (Initialize, Issue, Cancel)
Computer Networks & Security
1
This module is related to computer networks and helps you understand the weakness and concepts around securing the networks.
Topics:
- Network architecture, protocols, and technologies: Open Systems Interconnect (OSI) Model, Layered architecture
- Transmission Control Protocol/Internet Protocol (TCP/IP)
- Hybrid TCP/IP Model
- Application Layer Protocols: DNS, POP, SMTP, HTTP, SNMP
- Transport layer protocols: User Datagram Protocol (UDP), Transmission Control Protocol (TCP)
- Network/Internet layer protocols: IPsec protocols, IPv6, Internet Protocol (IP) v4
- Link-layer protocols: Ethernet, VLAN, Address Resolution Protocol (ARP) / Reverse ARP / Proxy ARP.
Application Security
1
Learn about the application-level security, secure SDLC methodology, and other controls/solutions to these vulnerabilities.
Topics:
- Importance of Application Security
- OWASP Top 10 web application vulnerabilities
- SSDLC (Secure Software Development Life Cycle)
Data & Endpoint Security
1
Study of data security and its related points.
Topics:
- Data Security
- Data Security Controls
- Endpoint Security
- Host/ Endpoint Security Controls
IdAM (Identity & Access Management)
1
Study of identity and access management, ensure appropriate access across heterogenous technology, and meet the increasing rigorous compliant demands.
Topics:
- Authorization
- Authentication
- Access Control
- Privilege levels
- IAM life cycle
- Identity & Access Management Process and activities (Single Sign-on, Role-Based)
Cloud Security
1
Study everything about the cloud and its related features.
Topics:
- Cloud Computing Architectural Framework
- Concerns & Best Practices
- Governance and Enterprise Risk Management
- Legal Issues: Contracts and Electronic Discovery
- Compliance and Audit Management
- Information Management and Data Security
- Interoperability and Portability
- Traditional Security, Disaster Recovery, and Business Continuity
- Data Centre Operations
- Incident Response
- Application Security
- Encryption and Key Management
- Identity, Entitlement, and Access Management
- Virtualization
- Security as a Service
- Phases of a Cyber Attack
- Security Processes in practice for Businesses
Cyberattacks
1
Gain an overview of the techniques and controls about a cyberattacks.
Topics:
- Identify and select a targe
- Package an exploit into a payload designed to execute on the targeted computer/network
- Deliver the payload to the target system
- Code is executed on the target system
- Install remote access software that provides a persistent presence within the targeted environment or system
- Employ remote access mechanisms to establish a command and control channel with the compromised device
- Pursue intended objectives, e.g. data exfiltration, lateral movement to other targets
Security practices for businesses
1
Study the different security practices in businesses and strengthen their existing infrastructure.
Topics:
- Key Security Business Processes
- Corp. & Security Governance
- IT Strategy management
- Portfolio/Program/Project management
- Change management
- Supplier (third party) management
- Problem management
- Knowledge management
- Info-sec management
- BCP
- IT Operations management
There are no prerequisites for cyber security training online, and you only require a good Internet Connection with a Laptop.
With this Course, you will gain an essential Certification in Cybersecurity, which will help you level up your familiarity with various concepts and know-how of basic Cybersecurity Tactics and implementations
Absolute beginners to Programming can take up this Course to improve their understanding of Networking and Security or gain the Cybersecurity Certification.
Productivity Hacks to Get More Done in 2018
— 28 February 2017
- Facebook News Feed Eradicator (free chrome extension) Stay focused by removing your Facebook newsfeed and replacing it with an inspirational quote. Disable the tool anytime you want to see what friends are up to!
- Hide My Inbox (free chrome extension for Gmail) Stay focused by hiding your inbox. Click "show your inbox" at a scheduled time and batch processs everything one go.
- Habitica (free mobile + web app) Gamify your to do list. Treat your life like a game and earn gold goins for getting stuff done!