Professional Certified Program in Cyber Security (Ethical Hacking, Networking, etc)

A foundation course to become a Cyber Security Analyst. No prior knowledge required.

Language: English

Instructors: Mr Janissar Akhtar

₹4999 20% OFF

₹3999

Why this course?

Description

In this Cyber Security online course, you’ll be learning how to recognize online threats and vulnerabilities, and explore the steps you could take to curb these risks.

The smarter technology is becoming, the higher the risks are posed. Understanding these security threats and vulnerabilities is essential to be safe online.

Our Cyber Security training program familiarizes our students with the basic terminologies of Cyber Security, and the numerous cyber attacks that everybody is prone to while being in cyberspace. The goal is simple - to invoke learning curiosity in our learners and develop a lifelong zeal to learn and continue in this field.

Course Curriculum

1. Introduction to CyberSecurity
Module 1 - Introduction to CyberSecurity
2. IT Terminologies
Module 2 Lecture 1 - Computer Basics
Module 2 Lecture 2 (a) - Computer Network and Servers
Module 2 Lecture 2 (b) - Number System
Module 2 Lecture 3 Internet and Databases
3. Computer Networking
Module 3 Lecture 1 - Computer Networking and Communication Media
Module 3 Lecture 2 (a) - The OSI Model
Module 3 Lecture 2 (b) - OSI Model Layers
Module 3 Lecture 2 (c) - The TCP Model
Module 3 Lecture 3 - Network Devices
Module 3 Lecture 4 (a) - IP Addresses
Module 3 Lecture 4 (b) - IP Version 6
Module 3 Lecture 5 - HTTP(s), DNS, and more
Module 3 Lecture 6 - Websites and backend
4. Entering CyberSecurity
Module 4 Lecture 1 - Cyber Security Threats
Module 4 Lecture 2 - Social Engineering
Module 4 Lecture 3 - Online scams
Module 4 Lecture 4 - Social Engineering Prevention and Protection
Module 4 Lecture 5 (a) - Malware and other Threats
Module 4 Lecture 5 (b) - Malware Prevention and Protection
Module 4 Lecture 6 - SQL Injection Attack
Module 4 Lecture 7 - Cross Site Scripting (XSS)
Module 4 Lecture 8 - DOS, DDOS and more
Module 4 Lecture 9 (a) - MITM, Spoofing
Module 4 Lecture 9 (b) - Sniffing, Hijacking and more
Module 4 Lecture 10 - Password Attacks
Module 4 Lecture 11 - Deepfakes
Module 4 Lecture 12 - Insider Threats
Module 4 Lecture 13 (a) - The Complete Hacking Overview
Module 4 Lecture 13 (b) - Hacking Explained Step by Step
Module 4 Lecture 14 - VPNs
5. Cryptography
Module 5 Lecture 1 - Introduction to Cryptography
Module 5 Lecture 2 - Cryptography Types and Functions
Module 5 Lecture 3 - Encryption and Decryption
6. Cyber Laws
Module 6 - Cyber Laws
7. Saying Goodbye...
Module 7 - Your future in Cybersecurity and Networking

How to Use

After successful purchase, this item would be added to your courses.You can access your courses in the following ways :

  • From the computer, you can access your courses after successful login
  • For other devices, you can access your library using this web app through browser of your device.

Browse through our other top coursesView More

Contact Us

Reviews

Powered By Graphy