Cyber Security Training (1) - PowerPoint PPT Presentation

About This Presentation
Title:

Cyber Security Training (1)

Description:

Our Cyber Security Training enables you to build basic to advanced cybersecurity knowledge and gain skills on techniques to defend against cyber threats. By taking this course, you will become proficient in securing your critical systems and assets. You will also be working with the latest Cybersecurity technologies and tools that help you become an expert in detecting vulnerabilities, threats, and cybersecurity attacks. Following course completion, you will be able to perform risk management, incident response, and more to protect your infrastructure from cyber attacks. All these skills will help you clear the Cybersecurity certification. – PowerPoint PPT presentation

Number of Views:375
Slides: 8
Provided by: sonalim21
Category:

less

Transcript and Presenter's Notes

Title: Cyber Security Training (1)


1
  • About HKR Trainings
  • HKR Trainings excel at providing you with the
    best online classes with high-quality facilities
    at a low price without any compromise on quality.
    What can you expect from us? A dedicated learning
    platform with 247 support, best in class
    training materials to help you learn advanced
    techniques and practical knowledge of all IT
    Technologies.
  • Our courses are specifically curated for both
    professionals as well as job-seekers. Online
    classes conducted by the best knowledgeable and
    certified trainers help you earn certification at
    your convenience.
  • Cyber Security Training
  • Our Cyber Security Training enables you to build
    basic to advanced cybersecurity knowledge and
    gain skills on techniques to defend against cyber
    threats. By taking this course, you will become
    proficient in securing your critical systems and
    assets. You will also be working with the latest
    Cybersecurity technologies and tools that help
    you become an expert in detecting
    vulnerabilities, threats, and cybersecurity
    attacks. Following course completion, you will be
    able to perform risk management, incident
    response, and more to protect your infrastructure
    from cyber attacks. All these skills will help
    you clear the Cybersecurity certification.
  • Cyber Security Training Online Objectives
  • Who should take up this Cybersecurity Training
    Course?
  • What are the prerequisites for taking up Cyber
    security online training?
  • How to start with the Cyber Security Training
    Course?
  • Who issues the course completion certificate?
  • Who delivers the Cyber Security Training Course?
  • What are the benefits of the certified Cyber
    Security Training Certification?
  • Cyber Security Modules
  • Basics of Cyber Security

1.3 Objectives of Cybersecurity
2
  • Confidentiality, integrity, availability
  • Nonrepudiation
  • 1.4 Roles of Cybersecurity
  • Governance, risk management, compliance
  • What does a Cybersecurity professional do?
  • Information Security roles
  • Board of Directors
  • Executive management
  • Senior Information security management
  • Cybersecurity practitioners
  • Concepts Of Cybersecurity
  • 2.1 Risk
  • Approaches to Cybersecurity
  • Key terms and definitions

2.4 Cybersecurity Controls
3
  • Identity management
  • Provisioning de-provisioning
  • Authorization
  • Access control lists
  • Privileged user management
  • Change management
  • Configuration management
  • Patch management
  • Principles Of Security Architecture
  • 3.1 Overview of Security Architecture
  • The security perimeter
  • Interdependencies
  • Security architectures frameworks
  • SABSA the Zachman framework
  • The open group architecture framework (TOGAF)

3.6 Monitoring, Detection, and Logging
4
  • Ingress, egress, data loss prevention (DLP)
  • Antivirus anti-malware
  • Intrusion detection systems
  • IDS limitations
  • IDS policy
  • Intrusion prevention systems
  • 3.7 Cryptography Fundamentals
  • Key elements of cryptographic systems
  • Key systems
  • 3.8 Encryption Techniques
  • Symmetric (private) key encryption
  • Asymmetric (private) key encryption
  • Elliptical curve cryptography
  • Quantum cryptography
  • Advanced encryption standard

5
  • 4.2 Process Controls - Vulnerability Management
  • Vulnerability management
  • Vulnerability scans
  • Vulnerability assessment
  • Remediation
  • Reporting metrics
  • 4.3 Process Controls - Penetration Testing
  • Penetration testers
  • Penetration testing phases
  • 4.4 Network Security
  • Network management
  • LAN/WAN security
  • Network risks
  • Wireless local area networks

? Design requirements
6
  • Testing
  • Review process
  • Separation of development, testing, production
    environments
  • OWASP top ten
  • Wireless application protocol (WAP)
  • 4.7 Data Security
  • Data classification
  • Data owners
  • Data classification requirements
  • Database security
  • Incident Response
  • 5.1 Comparing Event and Incident
  • Events vs. incident
  • Types of incidents

? Reporting
7
  • Network traffic analysis
  • Log file analysis
  • Time lines
  • Anti-forensics
  • 5.5 Disaster recovery and business continuity
    plans
  • What is a disaster?
  • Business continuity disaster recovery
  • Business impact analysis
  • Recovery time objectives (RTO)
  • Recovery point objective (RPO)
  • IS business continuity planning
  • Recovery concepts
  • Backup procedures
  • COURSE FEATURES
  • 30 Hrs of instructor-led training Lifetime access
    to recorded sessions Certification pass
    guaranteed
Write a Comment
User Comments (0)
About PowerShow.com