cyber security

Cyber Security Fundamental Techniques

Qualifying People - Developing Future

Qualifying People - Developing Future

What is Cyber Security?

Cyber Security is the technique which teaches people to protect themselves, networks and websites from various cyber-attacks & threats including Ransom ware, Social-Engineering, Phishing, Hacking, Banking Trojans, Identity Theft, Malwares and so on. It provides measures whose implementation can protect an individual’s personal data, organisation’s data and/or the data arising from Cyber Attacks, Cyber Frauds & Cyber Crime activities. Cyber Security also includes set of techniques used to protect the integrity of an organisation’s security architecture and safeguard its data against attack, damage or unauthorized access.

This day-long certification training will make the participants well versed with the processes and practices followed for protecting networks, digital data and an individual’s personal data from unauthorized attacks. It will impart knowledge and hands-on practice for protecting passwords, securing identity thefts, managing email security and safely executing social networking.

your Benefits

This training session imparts:

• Skills and knowledge on conducting safe online transactions for secure mobile and internet banking
• Preventive measures to avoid online transactional frauds
• Cyber Security Fundamental Techniques to support people/organisations to secure their cyber workspaces

course content / outline

Cyber Security Fundamentals

• Fundamentals & Concepts of Cyber Security, Information Security, IT Security
• Modern-Day Cyber Space Threats
• Elements of Information Security
• Scope, Policies, Procedures, Guidelines of Security
• Overview of Physical Security & Controls
• Understanding Incident Management Process

Online Risk, Threats & Security Controls

• Honeytrap, Identity Theft, Cyber Bullying
• Online Scams, Social Media Misuse, Privacy Loss
• Blackhat Search Engine Optimization, Malvertising, Compromised Legitimate Websites
• Browser-based Attacks, Proxy & Scripting based attacks
• Analysing Security Postures for Online Threats, Implementing IT Security Solutions
• Mitigating Online Risk & Implementing Defence-In-Depth Security

Malware Analysis

• Understanding Virus, Worms, Spyware, Keyloggers, Trojans & Wrappers
• Understanding Adware, Backdoor, Bots, Ransomware
• Malware Cyber-Map, Attack Vectors of Malwares
• Ransomware Case-Studies, Analysis & it’s Propagation Techniques
• System Scanning techniques for Identifying Malwares
• Malware Countermeasures & Implementing Multi-Layer Security Techniques

Social Engineering Attacks

• Understanding Social Engineering Concept & Techniques
• Human Errors, Factors & Behaviours that make Companies Vulnerable to Attack
• Phases & Types of Social Engineering Attack
• Human-based Social Engineering - Impersonation, Eavesdropping, Shoulder Surfing, Dumpster Diving, Piggybacking, Tailgating, Reverse Social Engineering, Insider Threat, Disgruntled Employee
• Computer-based Social Engineering – Hoax Letters, Chain Letters, Pop-Up Windows, Spam Emails (Phishing & Spear-Phishing), Instant-Chat Messengers
• Mobile-based Social Engineering – Malicious Apps, Repackaging Legitimate Apps, Fake Security Applications, Smishing, Vishing
• Countermeasures for Impersonation, Social Media Threats & Social Engineering Techniques

DoS/DDoS Analysis & Protection

• Overview of DoS/DDoS Concepts, Propagation Techniques, Attack Scenario
• DoS/DDoS Types – Bandwidth Attack, Service Request Flood, SYN Attack, SYN Flooding, Phlashing, Application-Level Flood Attack, Distributed Reflection DoS (DRDoS)
• Bots, Bot Network Creation, Malicious Code Propagation Techniques, Hands-on on various Bot Tools
• DoS/DDoS Detection Techniques, DoS/DDos Countermeasures Strategies

Mobile Device Security

• Anatomy of Mobile Device Attack – Device, Network, Data Center
• Mobile Attack Threat Vectors – Surveillance, Data Theft, Impersonation, Botnet Activity, Financial Loss
• Mobile Platform Vulnerabilities & Risks – Security Issues arises from App Stores, App Sandboxing Issues, Mobile Spams
• Rooting & Jailbreaking Process, Advantages & Disadvantages of Rooting & Jailbreaking
• Mobile Spywares, Mobile Device Tracking Tools, Mobile Device Management Tools and Mobile Protection Tools
• BYOD – It’s features & security loopholes
• Guidelines for Securing Android & iOS Devices

Data Security & Privacy Controls

• Need of Data Security, its types and techniques
• Understanding Computer Crimes, Disaster Recovery, Backup Techniques, Junk e-mails, Protecting Childrens
• Identification & Access Security, Internet Security, Software Security, Personal Systems Security
• Disaster Recovery Plan, Process, Approach and Advance Arrangements
• Privacy Issues & Threats and its Countermeasures

WHO SHOULD ATTEND?

• Every Mobile/Computer User
• Computer Science Students
• IT Industry Workforce
• Banking, Insurance, and Finance Professionals
• Government Agencies
• Law Enforcement Officers
• Account Managers
• IT Manager
• Network Security Manager
• Site Administrator

training duration

24 hrs

pre-requisites

Basic Computer Knowledge

Exam details

Duration: 90 Minutes
Details: 60 multiple choice Questions, each of one mark
Passing Criteria: 70% or above shall be obtained to pass the exam.

Certification

Candidates who successfully pass the examination will be awarded TÜV SÜD’s Certification on Cybersecurity Fundamentals.

Next Steps

Site Selector