Course Outline
By the end of this course, you will learn:
- CIA (Confidentiality, Integrity, and Availability) triad of information security which is an information security benchmark model used to evaluate the information security of an organization.
- Computer and network functions
- Common security technologies
- Common data protection protocols
- Introduction to Cyber Security and mitigation approaches
- Incident Handling
- Discuss about any one of the already acquired skill from security perspective and it’sapplication in context to Cyber Security
Course Severity – Intermediate
Course Duration – 25 Hours
Curriculum
- 11 Sections
- 0 Lessons
- 6 Weeks
Expand all sectionsCollapse all sections
- Security Basics0
- System and Network Security0
- Data Security Protocols and Security Technologies0
- Hacker Tools - Techniques - Exploits0
- Cybersecurity Attacks and Countermeasures0
- OWASP Top 10 Attacks and Countermeasures0
- Public Cybersecurity Attacks and Countermeasures0
- Implementing and Auditing Critical Security Controls0
- Continuous Monitoring and Security Operations0
- Cloud Security Architecture and Operations0
- Mobile Device Security0