infyni

Cybersecurity for Professionals

This live, online course teaches you to protect yourself, your data and your work from unknown threats you will most likely encounter in the future. Taught by an industry expert and accompanied by real-life examples, all your doubts are addressed on the spot during live classes.

Live Course

Live Class: Wednesday, 08 Nov

Duration: 30 Hours

Enrolled: 41

Offered by: infyni

Client: NRIVA

(11)

Live Course
$455 85% off

$68

Enrollment Closed Notify Me

About Course

As criminals grow more sophisticated, corporations are taking cybersecurity as a top operational priority. Ransomware attacks such as WannaCry and Petya put enterprises’ data at such huge risk that corporations took notice.

More than 25% of executives surveyed by PricewaterhouseCoopers expected companies to increase their cybersecurity spending by double digits, in 2022. A career in cybersecurity could be as a penetration tester, chief information security officer, security engineer, incident responder, security software developer, security auditor, or security consultant.

And yet there is a massive shortage of cybersecurity professionals. Typical IT professionals may not be trained in cybersecurity tactics, so a short course like our Fundamentals of Cybersecurity may be right to upskill yourself. Especially because many organizations may be unwilling to spend a significant amount of money to hire cyber security specialists. 

If you are considering pursuing a career in cybersecurity and don't know how and where to begin, this live online course is the start.


Skills You Will Gain

Information Security Controls and Threats IDS OS Security Encryption Algos Cryptography Understand PKI Cloud Security Web App Security SIEM Tools

Course Offerings

  • Instructor-led interactive classes
  • Clarify your doubts during class
  • Access recordings of the class
  • Attend on mobile or tablet
  • Live projects to practice
  • Case studies to learn from
  • Lifetime mentorship support
  • Industry specific curriculum
  • Certificate of completion
  • Employability opportunity
  • Topics
  • Instructor (1)
  • Reviews
  • Basic of Network

  • OSI and IP Addresssing
  • What is ethical hacking
  • Hacking stages
  • Types of hackers
  • What is Risk , Controls and Threats ?
  • Types of Malwares
  • Ransomware
  • CIA Triad
  • Information Security Standards
  • Information Security Compliance
  • Policies and procedures
  • Password Attacks
  • Ddos attacks

  • Network Security Devices
  • What is IDS, IPS and Firewall
  • working of IDS
  • Evading of IDS
  • Type of firewalls ?
  • Understand Firewall Rules
  • Firewall Rules Security Review
  • Firewall Bypassing Detection and Protection
  • What is Honey Pots
  • How does it work ?
  • Detect attack at honeypot
  • Data center architecture
  • Type of DC
  • DC Network Architecture overview
  • Data Security
  • DLP tools
  • Email Security
  • What is OS ?
  • OS Architecture
  • Windows Based Attacks
  • Hardening and Audit of Windows
  • Windows Password Cracking
  • Linux Architecture
  • Linux Basic Commands
  • Linux User management
  • Linux Server management
  • Hardeninig Audit of Linux
  • Linux Password Cracking
  • What is Cryptography
  • Understand Encryption Algos
  • Tools used to Cryptography
  • Understand PKI
  • What is Cloud computing ?
  • Types of cloud
  • Various Cloud providers
  • Cloud Computing Threats
  • Cloud Computing Security
  • Web Server and web app concepts ?
  • Threats to Web Applications
  • VA of Web app
  • Owasp top 10 oversview
  • XSS execution
  • CSRF
  • Man in the Middle attack
  • Session hijacking
  • SQL Injection
  • File upload Vulnerability
  • Remote code execution
  • Web APP protection and countermeasures
  • Log Baselining
  • Aggregation and normalization
  • Event Collection and Event Correlation
  • Correlation Rules
  • What is SIEM Tools ?
  • What is splunk ?
  • Installation and architecture
  • Indexes
  • SPL languages
  • Creating dashboard and alerts
  • Monitoring live attacks
  • Use cases
  • Splunk Stream
  • Introduction to Qradar
  • Installation
  • log collection and anlaysis
  • Use cases

(11)

Cybersecurity for Professionals students also learn