Arich Infotech

Cyber Security

Duration in Hours : 30

Duration in Days: 15

Cyber Security

Course Code: CYBSS20CS

20 Hours of Theory

10 Hours Lab

  1. Need of Cybersecurity
  2. CIA Triad
  3. Security Architecture
  4. Security Governance
  5. Security Auditing
  6. Regulations & Frameworks
  7. Ethical Hacking
  8. Types of Hackers
  9. Phases of Ethical Hacking
  10. Penetration Testing
  11. Types of Penetration Testing
  12. Footprinting
  13. Objectives of Footprinting
  14. Types of Footprinting
  15. Footprinting Techniques
  1. Types of cryptography
  2. Symmetric cryptography
  3. Asymmetric cryptography
  4. Hash functions
  5. Digital signatures
  6. Public Key Infrastructure (PKI)
  7. Attacks on cryptosystems
  1. Introduction to Computer Network
  2. Computer Networks – Architecture
  3. Layered architecture
  4. Open Systems Interconnect (OSI) Model
  5. Transmission Control Protocol/Internet Protocol (TCP/IP)
  6. Network Scanning
  7. Enumeration
  8. Common Network Threats/Attacks
  1. Web server architecture
  2. Web server attacks
  3. Countermeasures and patch management
  4. Web application architecture
  5. Web application attacks
  1. Authentication and authorization
  2. Authentication and authorization principles
  3. Regulation of access
  4. Access administration
  5. IdAM
  6. Password protection
  7. Identity theft

    Enquire About Our Courses

    If you have any questions about our courses or need more information, please fill out the form below, and we'll get back to you shortly!