Cyber Security Certification Training

Cyber Security Course, is most on-demand bootcamp in the Industry market. This Cyber Security Certification Bootcamp Course Online program is developed to teach real-world practical skills for becoming cyber security professionals. Our Training course help you to get job quickly and easily.

IT & Certification

24 Hours

Description

Learn Cybersecurity concepts from scratch with Simpliv’s Cybersecurity training. Throughout the training, you will learn important concepts such as ethical hacking, cryptography, computer networks & security, application security, idAM (identity & access management), vulnerability analysis, malware threats, sniffing, SQL injection, DoS, session hijacking, and various security practices for businesses along with hands-on demonstrations. Join this Cybersecurity Certification course and get certified as Cybersecurity Expert.

Course Objectives

This Cyber security training focuses mainly on the concepts of Cybersecurity and Ethical Hacking In this cyber security training program we are going to deal with cybersecurity, ethical hacking, cryptography, computer networks & security, application security, dAM (identity & access management), vulnerability analysis, malware threats, sniffing, SQL injection, DoS, session hijacking and arious security practices for businesses .

Target Audience

Anyone interested in Cybersecurity job roles like Network Administrator, System Administrator, Security Analyst, Security Engineer, Ethical Hacker, Pen Tester, and more

Basic Understanding

No basic knowledge required.

Course Content

No sessions available.

Simpliv Logo
Simpliv LLC
39658 Mission Boulevard,
Fremont, CA 94539, USA

Cyber Security Certification Training

Session 1: Cybersecurity & Ethical Hacking – Introduction

  1. Need of Cybersecurity
  2. CIA Triad
  3. Security Architecture
  4. Security Governance
  5. Security Auditing
  6. Regulations & Frameworks
  7. Ethical Hacking
  8. Types of Hackers
  9. Phases of Ethical Hacking
  10. Penetration Testing
  11. Types of Penetration Testing
  12. Footprinting
  13. Objectives of Footprinting
  14. Types of Footprinting

Session 2: Cryptography

  1. Types of cryptography
  2. Symmetric cryptography
  3. Asymmetric cryptography
  4. Hash functions
  5. Digital signatures
  6. Public Key Infrastructure (PKI)
  7. Attacks on cryptosystems

Session 3: Computer Networks & Security

  1. Introduction to Computer Network
  2. Computer Networks - Architecture
  3. Layered architecture
  4. Open Systems Interconnect (OSI) Model
  5. Transmission Control Protocol/Internet Protocol (TCP/IP)
  6. Network Scanning
  7. Enumeration
  8. Common Network Threats/Attacks

Session 4: Application and Web Security

  1. Web server architecture
  2. Web server attacks
  3. Countermeasures and patch management
  4. Web application architecture
  5. Web application attacks

Session 5: IdAM (Identity and Access Management)

  1. Authentication and authorization
  2. Authentication and authorization principles
  3. Regulation of access
  4. Access administration
  5. IdAM
  6. Password protection
  7. Identity theft

Session 6: Vulnerability Analysis & System Hacking

  1. Vulnerability Analysis
  2. Types of Vulnerability Analysis
  3. Vulnerability Assessment Lifecycle
  4. Vulnerability Assessment Tools
  5. Vulnerability Scoring Systems
  6. Vulnerability Assessments Report
  7. System Hacking
  8. Password Cracking
  9. Privilege escalation
  10. Executing Applications
  11. Hiding Files
  12. Clearing Logs

Session 7: Sniffing and SQL Injection

  1. Malware and its propagation ways
  2. Malware components
  3. Types of malware
  4. Concept of sniffing
  5. Types of sniffing
  6. Types of sniffing attacks
  7. SQL injection
  8. Types of SQL injection
  9. SQL injection Methodologies

Session 8: DoS and Session Hijacking

  1. DoS attack
  2. DDoS attack
  3. Common symptoms of DoS/DDoS attack
  4. Categories of DoS/DDoS Attack Vectors
  5. DoS/DDoS detection techniques
  6. Session hijacking
  7. Application level session hijacking
  8. Network level session hijacking
  9. Intrusion Detection System (IDS)
  10. Types of Intrusion Detection Systems
  11. Introduction to Firewalls
  12. Types of Firewalls
  13. Introduction to Honeypots
  14. Evading IDS

Coupons

No offers available at this time.

Live Support

Call

+510-849-6155

Mail to

support@simplivlearning.com

Similar Courses

Our Trusted Clients