Features
- Lectures - 54
- Duration – 27 Weeks
- Case Studies and Assessment – 10+
- Delivery Mode- Online/Offline
- Batches- Weekends
- Capstone Projects- 10+Projects
Cybersecurity is one of the most searched terms in the current generation. Cyber security may be defined as the practice of defending the system, networks, programs, and vital information of a person or any organization from continuously increasing malicious threats and cyber-attacks. Cyber security experts use various methods and technologies to put a stopper to such kinds of attacks and safeguard information.
With each passing day, Cyber criminals are becoming more and more equipped and sophisticated. So, the rate of intrusion is increasing rapidly and all organizations are showing concern about the safeguarding of their data this is the reason the Cyber security domain is experiencing huge growth and demand. The Bureau of Labor Statistics has predicted a whooping growth of 28% in the domain of Information security between the year 2016-2026 and it’ll be opening a larger scope for information security analysts or cyber security specialists.
Program Overview
- The most comprehensive curriculum with training material designed by NASSCOM, along with its 35 SIG(Special Interest Group) members such as Goldman Sachs, IBM, Ins Analytics, Infosys BPO, Insights of Data, JP Morgan, Karvy Analytics, Knod Global, KPMG, Wipro, WNS, Wells Fargo, Amazon, Capgemini, Concentrix, CITI, Cyient Insights, Accenture, EXL, First America, Fractal Analytics, GENPACT, Google, ADP Deloitte, HCL, HDFC, IBM, ISC2, NIIT University, PwC, Symantec, TCS to name a few, that will prepare you for future externalities in the data analytics industry and fulfill the gap of academics and industry requirements. This official NASSCOM-CERTIFIED Cyber Security Program covers all the demanded tools of Cyber Security which includes Python, Java, AWS, OWASP, Burp Suite, Snort, Wireshark, MetaSploit, and many more.
Program Structure
This Nasscom Certified Security Analyst program will cover in-depth knowledge and will give proficiency over more than 80 tools and skills to undertake any problem efficiently on the organizational level. This course will help the learner to lead a successful career in the field of cyber security. This sophisticatedly designed 700 Hours of cyber security curriculum has been bifurcated into five different segments to help the learner grasp everything smoothly.
- 70 hours Pre-Learning: Before you come in, get ready for the Program. You will get a series of online recorded tutorials to understand the structure of cybersecurity
- 130 hours Program: Here, you will get Hands-on Experience with various Cyber Security tools and techniques which include Python, Kali Linux, Java, Beautiful Soup, Nmap, Samba, IAM, LDAP, CAPTCHAS, DDos Attack, SQL Injection, Hashing, Encryption, Firewall, Metasploit, Packet Inspection, ICMP Attack, Vulnerability Management, and many more.
- 240 hours Post Program: Learning does not stop here. After completing the Program, you will work on Projects and Assignments. Doubt clearing is also provided. You will be working on any one capstone project from the list of a few projects of your choice. You also will get the recording of the live classes.
Eligibility:
This cyber security program has been curated carefully to ensure the smooth learning of the enrolled candidates. It will help the learners to match the various hierarchical requirements of various organizations working in the cybersecurity domain. It’ll help the learner to know the current world scenario, demand and need of cyber security, and, use of various tools to solve problems.
-
- Work Experience – This program will help the senior and mid-senior level managers of the cyber security domain make efficient decisions for the organization. This course can also be opted by any young or mid-level IT professionals looking for a transition into the domain of cyber security. A fresh graduate of any stream wants to join the cyber security domain and start a career. It can be a choice for any senior professional involved actively in the cyber security practices of any organization.
- Education – Graduates from Engineering/ Mathematics / IT backgrounds or any equivalent stream can join the program
Sample Certificate
Nasscom Certificate-
-
Module 1 : Information Security and Attacks
( Chapter 1: Introduction - Cyber Security Fundamentals)What is Hacking? , Computer Security Threats, Goals of Ethical Hacking, Skills and Tools required for Ethical Hackers, Process of Ethical Hacking, Process of Ethical Hacking -Demonstration Part 1, Process of Ethical Hacking - Demonstration Part 2, Information Gathering Concepts, Footprinting, Reconnaissance, Active Passive Scanning, CIA, (Confidentiality, Integrity & Availability) Threat, Vulnerabilities, Threat Actor, Risk etc definitions & concept, Advanced Cyber Security - Threats and Governance, What are Threats?, Types of threats (spoofing, tampering, repudiation, information breach, DOS, elevation of privilege), GitHub DDos Attack, Types of attack(DOS, Phishing, Ransomware), Introduction and importance to information security, elements of information security (purpose, audience and scope, security objective-CIA, Authority and access control, data classification (level 1-5), support and operation, security awareness, responsibilities rights and duty. Principle of Information security (Confidentiality, Integrity, Availability), Introduction to data security, types of data security (Encryption, Data Erasure, Data Masking, Data Resiliency), data security strategy (Physical security of servers and user devices, Access management and controls, Backups).
-
Chapter 2: Web Technologies, OWASP, DVWA, Bwapp with practicals
Practical on Metasploit and bwap, bWAPP Features, Why should you learn bWAPP?, bwapp prct.Dvwa feature and use, Kali Linux (tool) Demonstration - Web Application attack: Broken Authentication, Demonstration - Web Application attack: Blind SQL Injections, Demonstration - Web Application attack: Cross site scripting, Web Application Domain, Web Application Domain: Common Attacks, Hacking Methodology, Mobile Application Domain, Mobile Application Domain: Types of Android Attacks, steps of Incident preventation, network reconnaissance incidents (host detection, port enumeration, vulnerability assessment), DoS, Malicious Code, Information gathering (Spiders, Robots and Crawlers/Search Engine Discovery/Reconnaissance/Testing Web Application Fingerprint/. Analysis of Error Codes:)
-
Chapter 3: Cryptography with Practicals
Remediation Planning, Encryption, What is Encryption?, Prerequisites for Encryption, How does Encryption work?, Vulnerability Assessment, What is Decryption? , Encryption Vs Decryption, Types of Encryption, Encryption Algorithms and Protocols, Web application architecture, Web application attacks, Web server architecture, Web server attacks
-
Chapter 4: Network Concepts
Introduction to information security controls, types of controls (organizational control, people control, physical control, technological control), preventive, corrective, and digestive control, OSI concept, Protocols, ARP, SMTP, ICMP, TCP, 3-way Handshaking, Security Market Outlook, Computer Networks - Architecture, Layered architecture, Open Systems Interconnect (OSI) Model, Transmission Control Protocol/Internet Protocol (TCP/IP), Network Scanning, Enumeration, Common Network, Threats/Attacks, Packet Inspection, Deep Packet Inspection (Intrusions detection system and Intrusion Prevention, System), IP Security, ICMP attacks, TCP and UDP Security. Attacking Availability: Denial-of-Service, attacks, Distributed DOS attacks, SSL/TLS Data/Application, Security: confidentiality, Integrity, availability, authorization, authentication, identification, non-repudiation, types of control (preventive, detective, corrective, deterrent, recovery, compensating), access control, Security Vulnerability Management, Network devices (Hub, Switch, Router, Bridge, Gateway, Modem, Repeater, Access Point), Configuration of network devices, Network configuration tool, Firewall, Firewall configuration,
-
Chapter 5: Device Log Correlation, Data Management, DLP, Data backup
Introduction to data leakage (direct losses and indirect losses.), Types of Data Leakage, NPI (e.g. Customer Data), Confidentiality Info, PHI (e.g. Patient's Records), Intellectual Property, Data Leak Vector:- HTTP, Email, Networked Printer, End Point, Internal Mail, IM, Webmail, Data Classification, types of data classification, steps and process of data classification, Content awareness, Content analysis techniques (rule-based, data-based finger printing, partial document matching, lexicon), DLP (data in motion, data in rest, data in use), DLP limitation, DLP using DRM, DEFINITION OF EVENT CORRELATION, EVENT CORRELATION USE CASES AND TECHNIQUES, BENEFITS OF EVENT CORRELATION, Event log, Key concept of log management (log, event, incidents), log management process and challenges, configuration of windows event log, SIEM, Remote Software Access, Web Proxies, Firewall, Routers, What is Data backup, Importance of data backup, why to backup, RPO, RTO, Types (Mirror, Full, Differential, incremental backup, Cloud Backup, FTP backup,), Storage types (local or USB Disks, Network Shares and NAS, Data Backup to Tapes, Cloud Storage, ), Backup Procedures,
-
Chapter 6: ISO, ISMS, Compliance, Risk Management
Information Security Policy, Top Information Security Threats (Unsecure or Poorly Secured Systems, Social Media Attacks, Social Engineering, Malware on Endpoints, Lack of Encryption, Security Misconfiguration, Active and Passive Attack, Cyber Security Regulations, Roles of International Law, the state and Private Sector in Cyberspace, Cyber Security Standards. The INDIAN Cyberspace, National Cyber Security Policy 2013. Elements of an information security policy (Purpose, scope, Objective, authorization and access control, classification, data support operation, Security standard and guideline(COSO, COBIT, ITIL, NIST, NSA, ISO, IT act, Copyright, Patent law, IPR), Laws of Indian Govt., Cyber Security Landscape Cyber Security Policy Management, Cyber Security Policy Ecosystem, Cyber Security Policy Management Design, Cyber Security FrameWorks, ISMS Environment, Frameworks, ISO27001 Standard, Security Metrics, Types of Security Metrics (Strategic security metrics, Security management metrics, Operational security metrics), Mean-Time-to-Detect and Mean-Time-to-Respond, Number of systems with known vulnerabilities, Number of SSL certificates configured incorrectly, Volume of data transferred using the corporate network, Number of communication ports open during a period of time, Frequency of review of third-party accesses, frequency of access to critical enterprise systems by third parties, Percentage of business partners with effective cybersecurity policies, Introduction to Risk Assessment, Identification of Risk assessment, Risk assessment model (Identification, Assessment, Mitigation, Prevention), role and need of risk assessment.
-
Chapter 7: Information Security Management – Roles and Responsibilities
Hierarchy of Information security (Board of Director, CIO, CISO, CEO, System Architect, System Engineer, Security Director, System Admin, Security Analyst, IS Auditor, DB Admin), Importance of information security policy, element of information security (purpose, audience, CIA, encryption policy, data backup policy,
-
Module 2 : Configuration and incident handling
(Chapter 8: Incident Handling concepts)Incidents, types of Incidents, Impact of incidents, Information (alert, logs, network flow), Phases of incident handling, incident response life cycle
-
Chapter 09: Security Devices, Security configuration & Management, Sniffing concepts, Network attacks with practicals
Firewall, why firewall, DMZ, troubleshooting Cisco IOS Firewall, troubleshooting routers, anti-virus and anti-spam ware, incident response process (identification, recording, response, communication, containment, classification, investigation), Unauthorized Access Incidents, Traffic filtering( NAT-Network Address Translation, VPN- Virtual Private Network, IDP-Intrusion Detection & Prevention, CISCO IOS Firewall IDS Configuration Initializing Cisco IOS Firewall IDS, Initializing the Post Office, Configuring and Applying Audit Rules, Verifying the Configuration), IPS configuration, IPS Tuning, SNMP Configuration, Configuration of MoD Security, Patch Management (Windows Server Update Services)
-
Module 3 : CAPSTONE PROJECT
Keylogger Software, Network Traffic Analyser, Password Analyser and many moret