Course Brief Information
Course Features
Online & Offline
Networking:
➢ Introduction on computer Networks.
➢ Types of Networks
➢ Network devices
➢ OSI Model
➢ Ports and Protocols
➢ Three-way handshake
➢ IP and Subnetting
Security Basics:
➢ Main Security Terminology
➢ CIA Triad
➢ Security Tools and Architecture
➢ SOC Architecture with PPT and Network diagram
➢ Attacks (Network/Endpoint/Email)
➢ Types of Malwares
➢ Vulnerabilities
➢ OWASP Top 10
Cryptography:
➢ Encoding & Decoding
➢ Encryption & Decryption
➢ Hashing & Salting
➢ VPN
➢ SSL & TLS
Standard Reference Models for Security:
➢ Diamond Model of Intrusion
➢ Cyber kill chain model
➢ Mitre att&ck
➢ Incident Response Model (NIST)
Indicator Of Compromise (IOC) Investigation:
➢ URL Investigation
➢ Domain Investigation
➢ IP Investigation
➢ Hash Investigation
Email Investigation:
➢ Introduction to Emails and Phishing
➢ Types of Phishing Emails
➢ Analysing URL’s, Attachments and Artifacts
➢ Taking Defensive Measure
➢ Report Writing
➢ Lessons Learned
➢ Phishing Response Challenge
SIEM:
➢ Introduction to SIEM/Splunk
➢ Introduction to Splunk Architecture
➢ Logging
➢ SPL – Search Processing Language
➢ Dashboards, Reports and Alert Creation
➢ Alert Investigation
➢ Use-case Creations
Intrusion Prevention System:
➢ Network Log samples
➢ Network Alert Investigation
07:00 PM TO 08:30 PM
24*7 Mentor Support
6 Months Placement Assistance
- Featured Course
Getting Started With Cyber Security 3 for Beginner
and become a trusted guardian of online security. Join us to master the skills needed to protect against today’s digital risks.”
- Fundamental
- Input and output
- Conditional branching
- 8+ more lessons