Training Program on Cyber Security Fundamental Techniques
- Gain the skills and knowledge on conducting safe online transactions for secure mobile and internet banking.
- Learn about the preventive measures to avoid online transactional frauds.
- Acquire knowledge about cybersecurity Fundamental Techniques to support people/organisations to secure their cyber workspaces.
- Fundamentals & Concepts of Cyber Security, Information Security, IT Security
- Modern-Day Cyber Space Threats
- Elements of Information Security
- Scope, Policies, Procedures, Guidelines of Security
- Overview of Physical Security & Controls
- Understanding Incident Management Process
- Honeytrap, Identity Theft, Cyber Bullying
- Online Scams, Social Media Misuse, Privacy Loss
- Blackhat Search Engine Optimization, Malvertising, Compromised Legitimate Websites
- Browser-based Attacks, Proxy & Scripting based attacks
- Analysing Security Postures for Online Threats, Implementing IT Security Solutions
- Mitigating Online Risk & Implementing Defence-In-Depth Security
- Understanding Virus, Worms, Spyware, Keyloggers, Trojans & Wrappers
- Understanding Adware, Backdoor, Bots, Ransomware
- Malware Cyber-Map, Attack Vectors of Malwares
- Ransomware Case-Studies, Analysis & it’s Propagation Techniques
- System Scanning techniques for Identifying Malwares
- Malware Countermeasures & Implementing Multi-Layer Security Techniques
- Understanding Social Engineering Concept & Techniques
- Human Errors, Factors & Behaviours that make Companies Vulnerable to Attack
- Phases & Types of Social Engineering Attack
- Human-based Social Engineering - Impersonation, Eavesdropping, Shoulder Surfing, Dumpster Diving, Piggybacking, Tailgating, Reverse Social Engineering, Insider Threat, Disgruntled Employee
- Computer-based Social Engineering – Hoax Letters, Chain Letters, Pop-Up Windows, Spam Emails (Phishing & Spear-Phishing), Instant-Chat Messengers
- Mobile-based Social Engineering – Malicious Apps, Repackaging Legitimate Apps, Fake Security Applications, Smishing, Vishing
- Countermeasures for Impersonation, social media threats & social engineering techniques
- Overview of DoS/DDoS Concepts, Propagation Techniques, Attack Scenario
- DoS/DDoS Types – Bandwidth Attack, Service Request Flood, SYN Attack, SYN Flooding, Phlashing, Application-Level Flood Attack, Distributed Reflection DoS (DRDoS)
- Bots, Bot Network Creation, Malicious Code Propagation Techniques, Hands-on on various Bot Tools
- DoS/DDoS Detection Techniques, DoS/DDos Countermeasures Strategies
- Anatomy of Mobile Device Attack – Device, Network, Data Center
- Mobile Attack Threat Vectors – Surveillance, Data Theft, Impersonation, Botnet Activity, Financial Loss
- Mobile Platform Vulnerabilities & Risks – Security Issues arises from App Stores, App Sandboxing Issues, Mobile Spams
- Rooting & Jailbreaking Process, Advantages & Disadvantages of Rooting & Jailbreaking
- Mobile Spywares, Mobile Device Tracking Tools, Mobile Device Management Tools and Mobile Protection Tools
- BYOD – It’s features & security loopholes
- Guidelines for Securing Android & iOS Devices
- Need of Data Security, its types and techniques
- Understanding Computer Crimes, Disaster Recovery, Backup Techniques, Junk e-mails, Protecting Childrens
- Identification & Access Security, Internet Security, Software Security, Personal Systems Security
- Disaster Recovery Plan, Process, Approach and Advance Arrangements
- Privacy Issues & Threats and its Countermeasures
- Every Mobile/Computer User
- Computer Science Students
- IT Industry Workforce
- Banking, Insurance, and Finance Professionals
- Government Agencies
- Law Enforcement Officers
- Account Managers
- IT Manager
- Network Security Manager
- Site Administrator
- Gain the skills and knowledge on conducting safe online transactions for secure mobile and internet banking
- Learn about the preventive measures to avoid online transactional frauds
- Understand Incident Management Process
- Understand Virus, Worms, Spyware, Keyloggers, Trojans & Wrappers
- Understand Adware, Backdoor, Bots, Ransomware
- Duration: 90 Minutes
- Details: 60 multiple choice questions, each of one mark
- Passing Criteria: 70% or above shall be obtained to pass the exam.
- Gain the skills and knowledge on conducting safe online transactions for secure mobile and internet banking
- Learn about the preventive measures to avoid online transactional frauds
- Understand Incident Management Process
- Understand Virus, Worms, Spyware, Keyloggers, Trojans & Wrappers
- Understand Adware, Backdoor, Bots, Ransomware
What will you learn?
This day-long certification training will make the participants well versed with the processes and practices followed for protecting networks, digital data, and an individual’s personal data from unauthorized attacks. It will impart knowledge and hands-on practice for protecting passwords, securing identity thefts, managing email security, and safely executing social networking.
Course outline
Cyber Security Fundamentals
Online Risk, Threats & Security Controls
Malware Analysis
Social Engineering Attacks
DoS/DDoS Analysis & Protection
Mobile Device Security
Data Security & Privacy Controls
Who Should Attend?
Learning & Career benefits
Examination & Certification
Certification
Candidates who successfully pass the examination will be awarded the course completion certificate.
FAQ
1. When can I get the certificate?
Cybersecurity Fundamentals certification will be issued within 21 working days from the examination date.
2. When can I get the training material and invite?
One day before the commencement of the training program.
3. How do I pay the fees for training and examination?
Online mode
4. What are the benefits of the Cybersecurity Fundamentals Program?
5. Is there any refund policy for the paid fees?
Please refer to Cancellation and Refund policy page.