Cyber Security
Cyber Security

Course Outline
1
Operating Systems Basics
- Windows Basics
- Linux Basics
- Basics of Programming for Security
2
Basics of Information security
- Cyber Security - Definition
- CIA Triad
- Understanding Identification, Authorization, Authentication and Accountability
- Security Design Concepts
- Assets, Vulnerabilities and Threats (TVA)
3
Common Cyber Attacks
- DOS/DDOS
- Password Attacks
- Botnets
- Zombies
- Social Engineering
- Phishing
- Spear Phishing
- Spoofing
- Malware, Viruses and Worms
- Trojans
- Man-in-the-middle attacks
- Ransomware
- Spyware
- Adware
4
Types of Cyber attackers
- Black Hats, White Hats, Grey Hats
- Script Kiddies
- State sponsored
- Hacktivists
5
Applicable Types of Controls
- Deterrent
- Preventive
- Detective
- Compensating
- Corrective
6
Security Controls
- Administrative
- Logical/technical
- Physical
7
Logical /Technical Controls
- Firewall
- IDS/IPS
- Identity management
- Kerberos
- RADIUS
- TACACS+
- Diameter
8
Security Compliance
- NDB
- Australian privacy act
- APRA CPS 234 (Bank & Insurance)
9
Security Frameworks
- ISO 27001
- NIST/CSF
10
Security Governance
- Personnel Security
- Asset Security
- Policies, Standards, Procedures, and Guidelines
- Business Continuity
- Incident response and Disaster Recovery
- Security Operations Management
11
Security Risk management
- Risk Identification
- Risk Assessment/Analysis
- Risk Control
- Security Controls and Cost/Benefit Analysis
12
Information Gathering and Open Source Intelligence
- Footprinting
- Enumeration
- OSINT
This Cyber Security certification course developed in collaboration with best senior industry expert as an instructor who will give you sufficient insights into security tools and methodologies to excel in your next role as a Cyber Security consultant.
You will earn an industry-recognized certification from Smart Careers that will attest to your new skills and on-the-job expertise.
Cybersecurity is the merging of people, processes and technology that come together to protect organizations, individuals or networks from any kind of digital attacks.
Cybersecurity Consultants are highly in demand today. They protect important data from digital attacks and hackers.
IT security consultants assess software, computer systems, and networks for vulnerabilities, then design and implement the best security solutions for an organization’s needs.
Yes, anyone commence a career in Cyber Security can take this course. Getting certified will demonstrate your seriousness towards the field and help you build a strong foundation of the security concepts.
Internship placement in a real-life based project to put your newly learned Technical Skills to practice to gain hands-on experience.
Our top-tier career coach will train you on the advanced soft skills that will help you to convert an interview into well paid job in Australia.
Our Experienced Technical Recruiters Team will fully leverage your social profiles and hunt your dream job for you.
Productivity Hacks to Get More Done in 2018
— 28 February 2017
- Facebook News Feed Eradicator (free chrome extension) Stay focused by removing your Facebook newsfeed and replacing it with an inspirational quote. Disable the tool anytime you want to see what friends are up to!
- Hide My Inbox (free chrome extension for Gmail) Stay focused by hiding your inbox. Click "show your inbox" at a scheduled time and batch processs everything one go.
- Habitica (free mobile + web app) Gamify your to do list. Treat your life like a game and earn gold goins for getting stuff done!
Be the first to add a review.
Please, login to leave a review