f

Certpine,s Cybersecurity Certification Course will help you in establishing a strong foundation towards your journey in the Cybersecurity domain. As part of this Cybersecurity course, you will be learning about the various fundamental concepts about Security essentials, Cryptography, Network Security, Application Security, Data & Endpoint Security, Cloud Security, Cyber Attacks and Identity & Access Management.

  • 128K + satisfied learners. Reviews
Weekend $289
Weekdays

Training Features

Instructor-led Sessions

24 Hours of Online Live Instructor-Led Classes. Weekend Class : 8 sessions of 3 hours each.


Real-Life Case Studies

Live project based on any of the selected use cases, involving implementation of the various Cybersecurity concepts


Assignments

Each class will be followed by practical assignments which will aggregate to minimum 20 hours.


Lifetime Access

You get lifetime access to Learning Management System (LMS) where presentations, quizzes, installation guide & class recordings are there.


24 X 7 Expert Support

We have 24x7 online support team to resolve all your technical queries, through ticket based tracking system, for the lifetime.


Certification

Towards the end of the course, you will be working on a project. Certpine certifies you as a "Cybersecurity Professional" based on the project.


Forum

We have a community forum for all our customers that further facilitates learning through peer interaction and knowledge sharing.


Course Description

Cybersecurity is the combination of processes, practices, and technologies designed to protect networks, computers, programs, data and information from attack, damage or unauthorized access.

 

Certpines Cybersecurity Certification Course will help you in learning about the basic concepts of Cybersecurity along with the methodologies that must be practiced ensuring information security of an organization. Starting from the Ground level Security Essentials, this course will lead you through Cryptography, Computer Networks & Security, Application Security, Data & Endpoint Security, idAM (Identity & Access Management), Cloud Security, Cyber-Attacks and various security practices for businesses.

Cybersecurity is the gathering of advances that procedures and practices expected to ensure systems, PCs, projects and information from assault, harm or unapproved get to. In a processing setting, security incorporates both cyber security and physical security, it is imperative since cyber attackers can without much of a stretch take and obliterate the profoundly grouped data of governments, defense offices and banks for which the results are huge so it is essential to have an appropriate innovation which an avoid digital wrongdoings.

Anyone having the zeal to learn innovative technologies can take up this course. Especially, students and professionals aspiring to make a career in the Cybersecurity technology. However, Cybersecurity Certification Course is best suited for the below mentioned profiles:-
  • Networking Professionals
  • Linux Administrators

There are no prerequisites for addiLEARN's Cybersecurity certification course. Basic knowledge of networking and cloud will be beneficial. 

The requirement for doing practicals on the Cybersecurity course is a system with Intel i3 processor or above, minimum 8GB RAM and 20 GB HDD Storage

Project

For Practicals, we will provide you a virtual machine with Linux OS as the client which you can setup using the detailed installation guides provided in the LMS. In case you come across any doubt, the 24*7 support team will promptly assist you.

The requirement for doing practicals on the Cybersecurity course is a system with Intel i3 processor or above, minimum 8GB RAM and 20 GB HDD Storage

Curriculum

Learning Objective: In this module, you will learn about the essential building blocks and basic concepts around cyber security such as Confidentiality, Integrity, Availability, Authentication, Authorization, Vulnerability, Threat & Risk and so on. In addition to these concepts, you will also explore the core topics such as Security Governance, Audit, Compliance and Security Architecture. 
 
Topics:
  • Need of Cyber Security
  • CIA Triad
  • Vulnerability, Threat and Risk
  • Risk Governance & Risk Management
  • Security Architecture
  • Security Governance
  • Security Auditing
  • Compliance
  • Computer Security Architecture & Design

Learning Objective: In this module you will learn, various forms of Cryptographic techniques, their pragmatic relevance & weaknesses. You will learn how cryptography, its components, methods and its usage are employed in the enterprise to store and transmit messages safely. 
 
Topics:
  • Background of Cryptography
  • Symmetric Cryptography
  • Data Encryption Standard (DES)
  • Triple-DES
  • The Advanced Encryption Standard (AES)
  • International Data Encryption Algorithm (IDEA)
  • Blowfish
  • RC4
  • RC5
  • RC6
  • Asymmetric Cryptography
  • The Diffie-Hellman Algorithm
  • RSA
  • Elliptic Curve Cryptosystems (ECC)
  • Cryptographic Hash Functions
  • Attacks against Encrypted Data
  • Digital Certificates and its Format (X.509, X.500)
  • Certificate Authority, Certificate Repository, Certificate Revocation lists
  • Digital Certificate life cycle (Initialize, Issue, Cancel)

Learning Objective: In this module, you will glance over various aspects related to Computer Networks and in-parallel delve into understanding the weaknesses & concepts around securing the networks. 
 
Topics:
  • Network architecture, protocols, and technologies: Layered architecture, Open Systems Interconnect (OSI) Model
  • Transmission Control Protocol/Internet Protocol (TCP/IP)
  • Hybrid TCP/IP Model
  • Application Layer Protocols: HTTP, SNMP, DNS, POP, SMTP
  • Transport layer protocols: Transmission Control Protocol (TCP), User Datagram Protocol (UDP)
  • Network/Internet layer protocols: Internet Protocol (IP) v4, IPv6, IPsec protocols
  • Link layer protocols: Address Resolution Protocol (ARP) / Reverse ARP / Proxy ARP, Ethernet, VLAN

Learning Objective: In this module, you learn the importance of Application level security. You will glance over various known application weaknesses, techniques to attack them and various controls/ solutions to these vulnerabilities. You will also get an overview of Secure SDLC methodology. 
 
Topics:
  • Importance of Application Security
  • OWASP Top 10 web application vulnerabilities
  • SSDLC (Secure Software Development Life Cycle)

Learning Objective: In this module, you will glance over, various aspects related to data and endpoint (host) security. This being a primary need, is a very crucial topic. 
 
Topics:
  • Data Security
  • Data Security Controls
  • Endpoint Security
  • Host/ Endpoint Security Controls

Learning Objective: Identity and access management (IdAM) is the security discipline that enables the appropriate individuals to access the right resources at the right times for the right reasons. IdAM addresses the mission-critical need to ensure appropriate access to resources across increasingly heterogeneous technology environments, and to meet the increasingly rigorous compliance requirements. This security practice is a crucial undertaking for any enterprise. Enterprises that develop mature IAM capabilities can reduce their identity management costs and more importantly, become significantly more responsive in supporting new business initiatives.
 
In this module you will glance over, various aspects related to the principle of Identity & Access Management. This covers various intricacies around concepts of Authorization, Authentication, Identity & access management and its benefits to an enterprise. 
 
Topics:
  • Authorization
  • Authentication
  • Access Control
  • Privilege levels
  • IAM life cycle
  • Identity & Access Management Process and activities (Role Based, Single Sign on)

Learning Objective:  In this module, you will gain an overview of techniques & controls involved during various phases of a cyber-attack. 
 
Topics:
  • Phase 1 —Reconnaissance: Adversary identifies and selects a target
  • Phase 2 —Weaponize: Adversary packages an exploit into a payload designed to execute on the targeted computer/network
  • Phase 3 —Deliver: Adversary delivers the payload to the target system
  • Phase 4 —Exploit: Adversary code is executed on the target system
  • Phase 5 —Install: Adversary installs remote access software that provides a persistent presence within the targeted environment or system
  • Phase 6 —Command and Control: Adversary employs remote access mechanisms to establish a command and control channel with the compromised device
  • Phase 7 —Act on Objectives: Adversary pursues intended objectives e.g., data ex filtration, lateral movement to other targets

Learning Objective: A business primarily is about making profits via achieving set targets and by catering best to customers and keeping shareholders and investors happy. This involves huge number of complex and interdependent discrete processes to run smoothly, efficiently and in a well monitored way. Today IT being one of the core enablers & also an increasingly major business platforms – threats are more than likely to cause enough disruption that may cause the business to derail completely. 
 
In this module we will glance over a variety of such business processes - to appreciate the relation, applicability and practicability of various information/ cyber security and risk management concepts that may be put in place to help the business stay predictable, safer and within a controlled cyber risk profile thereby enabling it to continue chasing its set targets. 
 
Topics:
  • Key Security Business Processes
  • Corp. & Security Governance
  • IT Strategy management
  • Portfolio/Program/Project management
  • Change management
  • Supplier (third party) management
  • Problem management
  • Knowledge management
  • Info-sec management
  • BCP
  • IT Operations management
  • Overview of top 20 security controls

FAQ's

"You will never miss a lecture at Certpine You can choose either of the two options:

·         View the recorded session of the class available in your LMS.

 

·         You can attend the missed session, in any other live batch."

Your access to the Support Team is for lifetime and will be available 24/7. The team will help you in resolving queries, during and after the course.

To help you in this endeavor, we have added a resume builder tool in your LMS. Now, you will be able to create a winning resume in just 3 easy steps. You will have unlimited access to use these templates across different roles and designations. All you need to do is, log in to your LMS and click on the "create your resume" option.

We have limited number of participants in a live session to maintain the Quality Standards. So, unfortunately participation in a live class without enrollment is not possible. However, you can go through the sample class recording and it would give you a clear insight about how are the classes conducted, quality of instructors and the level of interaction in the class.

All the instructors at Certpine are practitioners from the Industry with minimum 10-12 yrs of relevant IT experience. They are subject matter experts and are trained by Certpine for providing an awesome learning experience.

You can give us a CALL at +91- 989 926 9264(India) / 1800-688-5897 (US) OR email at support@Certpine.org

Certification

     Once you are successfully through the project (Reviewed by a addiLEARN expert), you will be awarded with Certpine Cyber security certificate.