This is your path to a career in Cybersecurity. In this certificate program, you’ll learn in-demand skills that can have you job-ready in less than a month. No coding or experience required.

Skills from this course: security analysis, security administration, ethical hacking, penetration testing and vulnerability management.

What you’ll learn

Module Session Topics Sub-topics Duration (days/per day -8 hrs)
1 8hrs x 3 Fundamentals of Networking Basic concepts of networking 3



Network ports, Network protocols, Types of network devices and key networking terminologies



Basics of ping & traceroute and types of network



Fundamental concepts of OSI model



Network sharing and subnetting



Fundamental concepts of network infrastructure



Practical Exercises: Understanding router model



Assigning IP address
2 8hrs x 1 Network Security Techniques Firewalls and Intrusion Detection/Prevention Systems 1



Virtual Private Networks (VPNs) and Remote Access Security



Practical Exercises: Configuring firewall rules, setting up a VPN connection
3 8hrs x 1 Advanced Network Security Network Segmentation and Micro-Segmentation 1



Network Access Control (NAC) and VLAN Security



Practical Exercises: Configuring VLANs, designing network segmentation
4 8hrs x 1 Introduction to Advanced Network Management & Administration Understanding Network Architecture and Protocols 1



Network Monitoring and Performance Optimization



Practical Exercises: Wireshark packet analysis, bandwidth monitoring
5 8 hrs x 2 Fundamental of Cyber Security Cyber security and its importance 2



Different disciplines of cyber security



Cyber security threats and their types



Cyber security attacks and their applications



Ways to use various commands
6 8 hrs x 2 Basics of Security testing Basics of security testing and its importance 2



Basics of vulnerability scanning



Penetration testing and risk assessment



Risk assessment test



Security Audit and Posture Assessment Test



Ethical Hacking and Network Monitoring



Security Testing Tools



Practical Exercises: Installing and using various tools



Information gathering



Perform and analyse various attacks
7 8 hrs x 2 Advanced Application Security Secure Software Development Lifecycle (SDLC) 2



Web Application Security and OWASP Top Ten



Practical Exercises: Code review, identifying vulnerabilities in sample applications
8 8hrs x 2 Cloud Security Essentials Cloud Service Models (IaaS, PaaS, SaaS) and Deployment Models 1



Identity and Access Management (IAM) in the Cloud



Practical Exercises: Setting up IAM policies, exploring cloud security groups
9 8hrs x 1 Fundamentals of Access Management Basics of Identity and Access Management & its Importance 1



Basic concepts of User Identification, Authentication and Authorization



User Identification and Access Management Policies



Tools used for Identity and Access Management in a public cloud platform



Access Control Models



Security Authorization And Encryption



Single Sign-On and Access Management Best Practices



Practical Exercises: Demonstrate how to perform MFA in AWS



Demonstrate the ways to
10 8hrs x 2 Fundamentals of Incident Management and Response Basics of security controls 2



Security Policy and Frameworks



Basics of Incident Management and Incident Response



Basics of Incident Response Plan and Incident Communications Plan



Fundamental Concepts of Incident Monitoring and Identification



Disaster Mitigation and Containment



Business Continuity Planning and Disaster Recovery



Cyber Security Investigation



Basics of a Backup and Recovery Plan



Basic concepts of RTO (Recovery Time Objective) and RPO (Recovery Point Objective)



Practical Exercises: Disaster recovery plan



Describe service replication and how it can be performed
11 8hrs x 2 Fundamentals of security operations Basics of security forensics & its types 2



Understanding of system logging and security monitoring



Fundamentals of Continuous Security Monitoring



Techniques for Continuous Security Monitoring



Basics of Data Loss Prevention and its importance



Basic understanding of change and configuration management



Security monitoring tools



Practical Exercises: Installing & Configuring various tools



Creating rules & understand security logs
12
Operational Resilience Frameworks Understanding Operational Resilience and Its Importance 1



Developing Resilience Policies and Strategies
13
Practical Implementation and Exercises Hands-on Labs for Network Security Components



Simulated Cyber Attack Scenarios and Response Drills





  • Nagarjuna

    After completing the cybersecurity course, I feel more confident in my ability to handle cybersecurity challenges. It's a great confidence booster for anyone entering the field.

  • Ashrith

    Whether you're a beginner or have some experience in cybersecurity, this course caters to all levels. It's a great resource for those looking to deepen their understanding of the subject.

  • Karthik

    The practical focus of the course made the content immediately applicable. I appreciated that the lessons were not just theoretical but had real-world relevance. Highly recommended for anyone serious about cybersecurity.

img

Enrol Now

Complete Live Classes

This course includes

  • Cloud based Lab Excersies
  • Realtime projects on enterprise technologies
  • Certificate of Completion