Cyber Security Certification

Vepsun Technology helps you to learn the most in-demand Cyber Security Courses. Learn cyber security from best professionals

Advanced 0(0 Ratings) 0 Students enrolled
Created by Sanjeev Singh Last updated Fri, 11-Sep-2020 English
What will i learn?

Curriculum for this course
0 Lessons 00:00:00 Hours
Requirements
+ View more
Description
01 Learning Path
Introduction to Cybersecurity
  • The evolution of Cybersecurity
  • Cybersecurity & situational awareness
  • The Cybersecurity skills gap
Difference between Information Security & Cybersecurity
  • Protecting digital assets
Cybersecurity objectives
  • Confidentiality, integrity, & availability
  • Nonrepudiation
Cybersecurity Roles
  • Governance, risk management, & compliance
  • What does a Cybersecurity professional do?
  • Information Security roles
  • Board of Directors
  • Executive management
  • Senior Information security management
  • Cybersecurity practitioners
02 Learning Path
Risk
  • Approaches to Cybersecurity
  • Key terms & definitions
  • Likelihood & impact
  • Approaches to risk
  • Third-party risk
  • Risk management
Common Attack Types & Vectors
  • Threat agents
  • Attack attributes
  • Likelihood & impact
  • Generalized attack process
  • Non-adversarial threat events
  • Malware & attack types
Policies & Procedures
  • Policy life cycle
  • Guidelines
  • Policy frameworks
  • Types of Information Security policies
  • Access control policy
  • Personnel Information Security policy
  • Security incident response policy
Cybersecurity Controls
  • Identity management
  • Provisioning & de-provisioning
  • Authorization
  • Access control lists
  • Privileged user management
  • Change management
  • Configuration management
  • Patch management
03 Learning Path
Overview of security architecture
  • The security perimeter
  • Interdependencies
  • Security architectures & frameworks
  • SABSA & the Zachman framework
  • The open group architecture framework (TOGAF)
The OSI model
  • TCP/IP
The OSI model
  • Defense in Depth
Firewalls
  • Firewall general features
  • Network firewall types
  • Packet filtering firewalls
  • Stateful inspection firewalls
  • Stateless vs. stateful
  • Examples of firewall implementations
  • Firewall issues
  • Firewall platforms
04 Learning Path
Isolation & segmentation
  • VLANs
  • Security zones & DMZs
Monitoring, Detection, and Logging
  • Ingress, egress, & data loss prevention (DLP)
  • Antivirus & anti-malware
  • Intrusion detection systems
  • IDS limitations
  • IDS policy
  • Intrusion prevention systems
Cryptography Fundamentals
  • Key elements of cryptographic systems
  • Key systems
Encryption Techniques
  • Symmetric (private) key encryption
  • Asymmetric (private) key encryption
  • Elliptical curve cryptography
  • Quantum cryptography
  • Advanced encryption standard
  • Digital signature
  • Virtual private network
  • Wireless network protections
  • Stored data
  • Public key infrastructure
05 Learning Path
Encryption Applications
  • Applications of cryptographic systems
Process Controls – Risk Assessments
  • Applications of cryptographic systems
  • Attributes of risk
  • Risk response workflow
  • Risk analysis
  • Evaluating security controls
  • Risk assessment success criteria
  • Managing risk
  • Using the results of the risk assessment
Process Controls – Vulnerability Management
  • Vulnerability management
  • Vulnerability scans
  • Vulnerability assessment
  • Remediation
  • Reporting & metrics
Process Controls – Penetration Testing
  • Penetration testers
  • Penetration testing phases
06 Learning Path
Network Security
  • Network management
  • LAN/WAN security
  • Network risks
  • Wireless local area networks
  • Wired equivalent privacy & Wi-Fi protected access (WPA/WPA2)
  • Ports & protocols
  • Port numbers
  • Protocol numbers & assignment services
  • Virtual private networks
  • Remote access
Operating System Security
  • System/platform hardening
  • Modes of operations
  • File system permissions
  • Credentials & privileges
  • Command line knowledge
  • Logging & system monitoring
  • Virtualization
  • Specialized systems
Application Security
  • System development life cycle (SDLC)
  • Security within SDLC
  • Design requirements
  • Testing
  • Review process
  • Separation of development, testing, & production environments
  • OWASP top ten
  • Wireless application protocol (WAP)
Data Security
  • Data classification
  • Data owners
  • Data classification requirements
  • Database security
07 Learning Path
Event vs. Incident
  • Events vs. incident
  • Types of incidents
Security Incident Response
  • What is incident response?
  • Why do we need incident response?
  • Elements of an incident response plan
  • Security event management
Investigations, Legal Holds, & Preservation
  • Investigations
  • Evidence preservation
  • Legal requirements
Forensics
  • Data protection
  • Data acquisition
  • Imaging
  • Extraction
  • Interrogation
  • Ingestion/normalization
  • Reporting Advanced persistent threats (APT's)
  • Evolution of the threat landscape
  • Defining APTs
  • APT characteristics
  • APT targets
  • Stages of an APT attack
08 Learning Path
Mobile Technology – Vulnerabilities, Threats, & Risk
  • Physical risk
  • Organizational risk
  • Technical risk
  • Activity monitoring & data retrieval
  • Unauthorized network connectivity
  • Web view/user interface (UI) impersonation
  • Sensitive data leakage
  • Unsafe sensitive data storage
  • Unsafe sensitive data transmission
  • Drive-by vulnerabilities
Consumerization of IT & Mobile Devices
  • Consumerization of IT
  • BYOD
Cloud & Digital Collaboration
  • Risk of cloud computing
  • Web application risk
  • Benefits of cloud computing
  • Network traffic analysis
  • Log file analysis
  • Time lines
  • Anti-forensics
Disaster recovery & business continuity plans
  • What is a disaster?
  • Business continuity & disaster recovery
  • Business impact analysis
  • Recovery time objectives (RTO)
  • Recover point objective (RPO)
  • IS business continuity planning
  • Recovery concepts
  • Backup procedures
+ View more
Other related courses
00:00:00 Hours
0 0 $900 $600
00:00:00 Hours
0 0 $900 $600
00:00:00 Hours
Updated Sat, 12-Sep-2020
0 0 $1000 $815
About the instructor
  • 0 Reviews
  • 0 Students
  • 33 Courses
+ View more
xyz ...

xyz ...

Student feedback
0
Average rating
  • 0%
  • 0%
  • 0%
  • 0%
  • 0%
Reviews
$1360 $1500
Buy now
Includes:
  • 00:00:00 Hours On demand videos
  • 0 Lessons
  • Full lifetime access
  • Access on mobile and tv