Course Overview:
Performing data analysis with the ability to identify vulnerabilities, risks, and threats. Configuring, managing, and using threat-detection tools. Securing and protecting organization systems and applications.
Course Content:
Module 1: Threat Management Part-I
- Cybersecurity Analysts
- Cybersecurity Roles and Responsibilities
- Risk Evaluation
- Frameworks and Security Controls
- Penetration Testing Processes
- Reconnaissance Techniques
- Open Source Intelligence
- Social Engineering and Topology Discovery
- Port Scanning and Service discovery Tools
- OS Fingerprinting
Module 2: Threat Management Part-II
- Security Appliances
- Configuring Firewalls
- Intrusion Detection and Prevention
- Configuring IDS
- Configuring Anti-virus Software
- Enhanced mitigation experience toolkit
- Logging and Analysis
- Malware Threats
- Packet capture
- Packet capture Tools
- Monitoring tools
- Log review and SIEM
- SIEM data outputs
Module 3: Vulnerability Management
- Managing vulnerabilities
- Vulnerability management requirements
- Asset inventory
- Data classification
- Vulnerability management processes
- Vulnerability scanners
- Microsoft baseline security analyzer
- Beyond Trust
- Configuring vulnerability scans
- Vulnerability scanning criteria
- Exploit frameworks
- Remediating vulnerabilities
- Remediation and change control
- Remediating Host vulnerabilities
- Remediating Network vulnerabilities
- Remediating Virtual Infrastructure vulnerabilities
- Secure Software Development
- Software Development life cycle
- Software Vulnerabilities
- Software security testing
- Web application firewalls
- Source authenticity
- Reverse engineering
Module 4: Cyber Incident Response
- Incident response
- Incident response processes
- Threat classification
- Incident severity and prioritization
- Types of Data Breaches
- Computer Forensics
- Digital Forensics Investigation Process
- Documentation
- Image acquisition
- Password cracking
- Analysis utilities
- Incident analysis and recovery
- Analyzing network symptoms
- Analyzing host symptoms
- Analyzing application symptoms
- Using sysinternals
- Incident Handling Tools
Module 5: Security Architecture
- Secure Network Design
- Control Types
- Network Segmentation
- Blackholes | Sinkholes and Honeypots
- System Hardening
- Group Policies
- Endpoint Security
- Identity and Access Management
- Network Access Control
- Identity security issues
- Authorization & Authentication
- Single sign on
- Exploiting identities
- Security frameworks
- Security Policies and Procedures
- Personnel Policies and Training
Please Note:
Target Groups:-
* Engineering Students
– Electrical Students
– Electronics Students
– Mechanical Students
– Mechatronics Students
– IT Related Students
– Technical Students
* Working Professionals
– Mechanical Engineering
– Electrical Engineering
– Electronics Engineering
– Mechatronics Engineering
– IT Related Professionals
– Technicians