Single
Cyber Security
1. Introduction to Cyber Security
a. What is Cyber Security
b. Common types of Cyber Security Threats
c. What Cyber Security can prevent
d. Careers in Cyber Security
e. Impact of Cyber Security on your business
f. How to minimise the impact of Cyber Attack on business
g. Surface Web, Deep Web, Dark Web & Darknet
h. Cyber Security Principles
i. Case Study
j. Types of Hackers
k. Defence in depth
l. Types of Security Policy
m. Vulnerability Assessment
n. Penetration Testing
2. System Hacking & Securing Operating Systems
a. Nontechnical Attacks or Non-Electronic Attacks
b. Active Online Attacks
c. Passive Online Attacks
d. Spywares & Key loggers
e. Steganography
f. Steganalysis
g. Guidelines To Secure Windows OS
3. Malware Threats
a. What is Malware
b. Categories Of Malware
c. Common Ways Malware Infects your Computer
d. Computer malware Symptoms
e. ways to prevent malware infection
4. Network Sniffing
a. What is Network Sniffing?
b. Network Sniffing can
c. How a Sniffer works?
d. Protocols which are affected by Sniffing
e. Hardware Protocol Analyzers
f. How to Defend Against Sniffing
5. Web browser Security
a. Securing Web browsing
i. VPN
ii. Proxy Server
b. TOR
c. Session Hijacking
d. Countermeasures
6. Securing Email Communications
a. Email Footprinting
b. Email Encryption
7. Social Engineering
a. Social Engineering Concepts
b. Impact of Attack on Organization
c. Human Behaviours Vulnerable to Social Engineering attacks
d. Factors that make companies vulnerable to attacks
e. Social Engineering Prevention
f. Social Engineering Techniques
g. How to avoid being a victim
h. What can you do if you are a victim
i. Identity Theft
j. Countermeasures
8. DOS/DDOS Attacks
a. DoS/DDoS Concepts
b. Botnet
c. Counter-measures
9. Securing Mobile Devices
a. Mobile Security - Attack Vectors
b. Consequences of Attack Vectors
c. Mobile Spam
d. How to Secure iPhone and iPad Devices
e. How to Secure Android Devices
f. How to Secure Windows Device
10. Securing Wireless Networks
a. Wireless Concepts
b. Wireless Encryption
c. Best practices to improve the security of your wireless network
d. Wireless Threats
e. Counter-measures
11. Securing The Cloud
a. Introduction to Cloud Computing
b. Cloud Computing Threats
c. Cloud Computing Attacks
d. Cloud Security
12. Cryptography
a. Cryptography Concepts
b. Encryption
c. Types of Encryption
d. Diffie-Hellman Key Exchange
e. Cryptographic Hash Functions
f. Digital Signatures
g. Digital Certificates
h. Cryptography Tools
i. Disk Encryption
13. Data Backup and Disaster Recovery
a. Data Backup Concepts
b. Types of Data Backups
c. Windows Backup and Restore Procedures
d. Secure Data Destruction
14. Information Security Law & Standards
You will get various benefits by joining our courses. Here is a list of some of the benefits.
8500 Beverly 6692 Blvd Los Angeles, California(CA), 90048
+1 213-528-8282
info@technosoftitservices.com
Technosoft IT Services is one of the leading online training and placement organization. We deal in Training, Corporate Training, Job Assistance, and Placement.
© Technosoft IT Services. All Rights Reserved. Designed by Technosoft IT Services