CYBER SECURITY Description
Cybersecurity, also known as information security or computer security, is the
practice of protecting computer systems, networks, data, and devices from
unauthorized access, cyberattacks, theft, damage, or disruption. In today's
interconnected world, where digital information is increasingly valuable and
vulnerable, cybersecurity has become a critical aspect of protecting
individuals, organizations, and nations from cyber threats.
Key features of Cyber Security include:
- Confidentiality:
Ensuring that sensitive data is accessible only
to authorized individuals or systems and protected from unauthorized access
or disclosure.
- Integrity:
Maintaining the accuracy and reliability of data and
systems by preventing unauthorized modifications, alterations, or tampering.
- Availability:
Ensuring that information and resources are accessible and available to
authorized users when needed, while also protecting against disruptions
or denial-of-service attacks.
- Authentication:
Verifying the identity of users, devices, and
systems to ensure that only authorized entities can access resources and
perform actions.
- Authorization:
Granting appropriate levels of access and
privileges to users, based on their roles, responsibilities, and
permissions, while also limiting access to sensitive data or critical
systems.
- Networking Topology and Types of Network
- TCP/IP Models and OSI Layers
- Routing and Switching
- Subnet Mask & Subnetting
- MAC Address
- CAM table, ARP Table, and its uses
- Operating Systems and OS Process and
ResourceManagement - 1
- OS Process and Resource Management -2 &
Windows Basics - 1
- Windows Basics - 2 & Linux Basics - 1
- Linux Basics - 2
- Basic Concepts of Information
SecurityAuthentication and Authorization
- Basic Concepts of Information Security-How
Internet Works and Protocols
- Basic Concepts of Information
SecurityCryptography and Firewalls
- Risk Management & Law Compliance
- Application Security -1
- Application Security -2
- Application Security -3
- Cloud Computing Concepts
- Cloud Architecture Security - 1
- Cloud Architecture Security - 2 & Cloud
DataSecurity - 1
- Cloud Data Security - 2 & Cloud Application
Security - 1
- Cloud Application Security - 2
- Introduction to Ethical Hacking and Footprinting
and Reconnaissance - 1
- Footprinting and Reconnaissance - 2 and
Scanning Networks
- Enumeration and Vulnerability Analysis
- System Hacking - 1 and Malware Threats - 1
- Malware Threats - 2 and Sniffing - 1
- Sniffing - 2 & Social Engineering - 1
- Social Engineering - 2 and Denial-of-Service -1
- Denial-of-Service - 2
- Session Hijacking and Evading IDS Firewalls and
Honeypots
- Hacking Web Servers
- Hacking Web Applications and SQL Injection - 1
- Session 1
- Hacking Wireless Network - 2 and Hacking Mobile
Platforms - 1
- Hacking Mobile Platforms - 2
- loT and OT Hacking
- Introduction to Incident Handling
- Incident Handling Process
- First Response and Containment
- First Response and Containment - 1
- First Response and Containment - 2
- Lab session for First Response and Containment
- Lab session for First Response and Containment
- Incident Investigation/Forensic Analysis - 1
- Incident Investigation/Forensic Analysis - 2
- Incident Investigation/Forensic Analysis - 3
- Lab session for Incident Investigation
- Lab session for Incident Investigation
- Eradication and Recovery
- Lab session for Eradication and Recovery
- Reporting
- Lab session for Reporting
- Lab session for Reporting & other
- Network Penetration Testing - 3
- Lab session for Network Penetration Testing
- Application Penetration Testing - 1
- Application Penetration Testing - 2
- Application Penetration Testing - 3
- Lab session for Application Penetration Testing
- Application Penetration Testing - 4
- Application Penetration Testing - 5
- Other Technology Penetration Testing - 1
- Other Technology Penetration Testing - 2
- Introduction to SOC - 1
- Introduction to SOC - 2 and SOC Generations
- SOC Activities
- Lab session for SOC Activities
- SIEM - 1
- Lab session for SOC Activities
- SIEM - 2
- SIEM - 3
- Lab session for SIEM
- SOC Deployment - 1
- Lab session for SOC Deployment
- Lab session for SOC Deployment
- SOC Deployment -2
- Incident Detection with Threat Intelligence
- Lab session for SOC Deployment
- You will never miss a class at My IT Teachers! You
can
choose either of the two options:
- You can go through the recorded session of
the
missed class and the class presentation that
are
available for online viewing through the
LMS.
- You can attend the missed session, in any
other live
batch. Please note, access to the course
material
will be available for a lifetime once you
have
enrolled in the course.
- My IT Teachers is committed to providing you with
an
awesome learning experience through world-class
content
and best-in-class instructors.
- We will create an ecosystem through this
training, which
will enable you to convert opportunities into
job offers
by presenting your skills at the time of an
interview.
We can assist you in resume building and also
share
important interview questions once you are done
with the
training. However, please understand that we are
not
into job placements.
- We have a limited number of participants in a
live
session to maintain Quality Standards. So,
unfortunately, participation in a live class
without
enrollment is not possible. However, you can go
through
the sample class recording, and it would give
you a
clear insight into how the classes are
conducted, the
quality of instructors, and the level of
interaction in
the class.