Fundamentals of Cybersecurity II

This live, online course teaches you to protect yourself, your data and your work from unknown threats you will most likely encounter in the future. Taught by industry experts, with real life examples and hands-on projects as assignments you will cover the fundamentals of cybersecurity by the end.

Live Class: Tuesday, 12 Jul

Enrolled: 0

Duration: 30 Hours

Offered by: infyni

$219 20% off


About Course

As criminals grow more sophisticated, corporations are taking cybersecurity as a top operational priority. Ransomware attacks such as WannaCry and Petya put enterprises’ data at such huge risk that corporations took notice.

More than 25% of executives surveyed by PricewaterhouseCoopers expected companies to increase their cybersecurity spending by double digits, in 2022. A career in cybersecurity could be as a penetration tester, chief information security officer, security engineer, incident responder, security software developer, security auditor, or security consultant.

And yet there is a massive shortage of cybersecurity professionals. Typical IT professionals may not be trained in cybersecurity tactics, so a short course like our Fundamentals of Cybersecurity may be right to upskill yourself. Especially because many organizations may be unwilling to spend a significant amount of money to hire cybersecurity specialists. 

If you are considering pursuing a career in cybersecurity and don't know how and where to begin, this course is the start.

Skills You Will Gain

Cyber Security Fundamentals Attacker Techniques Security Concepts Authentication Authorization

Course Offerings

  • Instructor Led Live sessions
  • Clarify doubts during session
  • Access Session Recordings
  • Attend on mobile and Tablet
  • Assessments and Competition
  • Direct Messages
  • Feedback from Instructor
  • Full lifetime Resources
  • Certificate of Completion
  • Topics
  • Instructor (1)
  • Security Concepts:Authentication

  • Authorization
  • Non-repudiation
  • Confidentiality
  • Integrity
  • availability
  • Definition of cyber-crime
  • types of cyber-crimes and types of cyber-criminals
  • Anti-forensics
  • Use of proxies
  • use of tunneling techniques
  • Fraud techniques
  • Phishing and malicious mobile code
  • Rogue antivirus
  • Click fraud
  • Threat Infrastructure
  • Botnets
  • Fast Flux and advanced fast flux.

  • Techniques to gain foothold: Shellcode
  • Buffer overflows
  • SQL Injection
  • Race Conditions
  • DoS Conditions
  • Brute force and dictionary attacks
  • Misdirection
  • Reconnaissance
  • and Disruption
  • Cross-Site Scripting (XSS)
  • Social Engineering
  • WarXing
  • DNS Amplification Attacks
  • Patent Law
  • Trademark Law
  • Copyright
  • Software Copyright or Patented
  • Domain Names and Copyright disputes
  • Electronic Database and its Protection
  • IT Act and Civil Procedure Code
  • IT Act and Criminal Procedural Code

Fundamentals of Cybersecurity II students also learn