Online Course Fundamentals of Cybersecurity for Professionals | infyni

Fundamentals of Cybersecurity for Professionals

This live and interactive training by an industry expert is all you will need to begin your career in cybersecurity.

Live Course

Live Class: Thursday, 07 Mar

Duration: 30 Hours

Enrolled: 2

Offered by: infyni

(12)

Live Course
$438 20% off

$350

About Course

As the threat of cybercrime escalates the need for cybersecurity professionals grows. Cyber attacks in the recent past have affected major companies and compromised bank records, credit card numbers and other private information, including usernames, passwords, emails, phone numbers and addresses.

And yet there is a massive shortage of cybersecurity professionals. Typical IT professionals may not be trained in cybersecurity tactics, so a short course like our Fundamentals of Cybersecurity may be right for upskilling yourself. Especially since many organizations are unwilling to spend significantly on hiring cybersecurity specialists. 


Skills You Will Gain

Information Security Controls and Threats IDS OS Security Encryption Algos Cryptography Understand PKI Cloud Security Web App Security SIEM Tools

Course Offerings

  • Instructor-led interactive classes
  • Clarify your doubts during class
  • Access recordings of the class
  • Attend on mobile or tablet
  • Live projects to practice
  • Case studies to learn from
  • Lifetime mentorship support
  • Industry specific curriculum
  • Certificate of completion
  • Employability opportunity
  • Topics
  • Instructor (1)
  • Reviews
  • Basic of Network
  • OSI and IP Addresssing
  • What is ethical hacking
  • Hacking stages
  • Types of hackers
  • What is Risk , Controls and Threats ?
  • Types of Malwares
  • Ransomware
  • CIA Triad
  • Information Security Standards
  • Information Security Compliance
  • Policies and procedures
  • Password Attacks
  • Ddos attacks
  • Network Security Devices
  • What is IDS, IPS and Firewall
  • working of IDS
  • Evading of IDS
  • Type of firewalls ?
  • Understand Firewall Rules
  • Firewall Rules Security Review
  • Firewall Bypassing Detection and Protection
  • What is Honey Pots
  • How does it work ?
  • Detect attack at honeypot
  • Data center architecture
  • Type of DC
  • DC Network Architecture overview
  • Data Security
  • DLP tools
  • Email Security
  • What is OS ?
  • OS Architecture
  • Windows Based Attacks
  • Hardening and Audit of Windows
  • Windows Password Cracking
  • Linux Architecture
  • Linux Basic Commands
  • Linux User management
  • Linux Server management
  • Hardeninig Audit of Linux
  • Linux Password Cracking
  • What is Cryptography
  • Understand Encryption Algos
  • Tools used to Cryptography
  • Understand PKI
  • What is Cloud computing ?
  • Types of cloud
  • Various Cloud providers
  • Cloud Computing Threats
  • Cloud Computing Security
  • Web Server and web app concepts ?
  • Threats to Web Applications
  • VA of Web app
  • Owasp top 10 oversview
  • XSS execution
  • CSRF
  • Man in the Middle attack
  • Session hijacking
  • SQL Injection
  • File upload Vulnerability
  • Remote code execution
  • Web APP protection and countermeasures
  • Log Baselining
  • Aggregation and normalization
  • Event Collection and Event Correlation
  • Correlation Rules
  • What is SIEM Tools ?
  • What is splunk ?
  • Installation and architecture
  • Indexes
  • SPL languages
  • Creating dashboard and alerts
  • Monitoring live attacks
  • Use cases
  • Splunk Stream
  • Introduction to Qradar
  • Installation
  • log collection and anlaysis
  • Use cases

(12)