Cyber Security
Cyber security is the practice of defending computers and servers, mobile devices, electronic systems, networks and data from malicious attacks. It is also known as information technology security or electronic information security.
The threats countered by cyber-security are three-fold: Cybercrime, which includes single actors or groups targeting systems for financial gain; Cyberwar, which often involves information gathering and is politically motivated; and Cyber terror, which is intended to undermine electronic systems and cause panic or fear. Common methods used by attackers to control computers or networks include viruses, worms, spyware and Trojans. Viruses and worms can self-replicate and damage files or systems, while spyware and Trojans are often used for surreptitious data collection. The average user typically comes in contact with malicious code via an unsolicited email attachment or by downloading programs that look legitimate, but in fact carry a malware payload.
Cybersecurity is a very broad category which encompasses numerous hardware and software technologies, and can be applied on any level, including personal, corporate or governmental devices or networks.
Passwords are a cybersecurity tool that people encounter nearly every day. Other common cybersecurity tools include:
SCOPE & FEATURE
A cybersecurity plan is critical for any company with highly sensitive information. Many companies now appoint a chief security officer (CSO) or chief information security officer (CISO) to oversee their cybersecurity.
The cyber security market is expected to grow to around $232 Billion by 2022 according to a report. Domestic IT giants like Infosys and even global players like CISCO have been betting big in the cyber security domain.
The growth in cloud-based security solutions and tools, and increase in adoption of big data analytics to gather cyber threats data among other trends are creating humongous opportunities in the area of cyber security.
SYLLABUS
CCNA
• Introduction to Inter networking.
• OSI & TCP/IP Stack.
• IP Addressing, Subnetting, VLSM.
• Configuring Router & Switch.
• IP Routing.
• Switching, VLAN, VTP.
• WAN.
• Basic Network Security & ACL.
• IP Services & Managing Cisco IOS.
• Wireless Technology.
• Firewalls & VPN.
• Troubleshooting.
MCSA
• Install and configure servers.
• Configure server roles and features.
• Configure Hyper –V.
• Deploy and configure core network services.
• Install and administer Active Directory.
• Create and Manage Group policy.
LINUX
• Installation.
• User and Group Administration.
• Redhat Infrastructure.
• Redhat Package Manager.
• The Linux kernel.
• Rescue modes.
• Network Services.
• Security.
• X Window System.
• Routing, Forwarding, and Firewalls.
• File System Management.
ETHICAL HACKING
• Introduction to Ethical Hacking.
• Foot printing and Reconnaissance.
• Scanning Networks.
• Enumeration.
• System Hacking.
• Trojans and Backdoors.
• Viruses and Worms.
• Sniffers.
• Social Engineering.
• Denial of Service.
• Session Hijacking.
• Hacking Webservers.
• Hacking Web Applications.
• SQL Injection.
• Hacking Wireless Networks.
• Hacking Mobile Platforms.
• Evading IDS, Firewalls, and Honeypots.
• Cryptography.
• Penetration Testing.
CYBER SECURITY
• Introduction To Network Security.
• Virtual Private Networks.
• MPLS And MPLS VPN.
• E-Mail Security.
• Web Security.
• Incident And Incident Response.
• Initial Response And Forensic Duplication.
• Storage And Evidence Handling.
• Network Forensics.
• Mobile And Digital Forensics.
• Systems Investigation And Ethical Issues.
• Security Framework For Mobile Systems.
• Mobile Phone Forensics.
• Introduction To Digital Forensics.
• Analysis Of Digital Forensic Techniques.
• Mobile And Wireless Security.
• Mobile Security.
• Securing Wireless Networks.
• ADHOC Network Security.
• V-RFID Security.
• Malware Analysis.
• Implementation of Covert Channel.
• Virus Design And Its Implications.
• Malware Design Using Open Source.
• Virus And Worm Analysis.
• Penetration Testing And Vulnerability Assessment.
• Foot Printing & Social Engineering.
• Scanning & Enumeration.
• System Hacking.
• Sniffers & SQL Injection.
• Myths Of Information Security Management.
• Information Security Assessments.
• Security Management Concepts And Principles.
• Configuration Management.
• Security Management Planning.
• Risk Assessment & Security Audit.
• Data Collection.
• Data Analysis.
• Risk Assessment.
• Security Audit Process.
• Storage Management & Security.
• Storage Area Networking.
• Backup And Recovery Mechanisms.
• Storage Security.
• Storage Infrastructure Management.
• Cloud Computing Fundamentals.
• Cloud Applications.
• Securing The Cloud.
• Virtualization Security.
• Cloud Security Management.
• Fundamentals Of Cyber Security.
• Issues In Cyber Security.
• Intellectual Property Rights.
• Procedural Issues.
• Legal Aspects Of Cyber Security.
HTML
• HTML Elements, HTML Attributes, HTML Headings, HTML Paragraphs.
• HTML Formatting, HTML Fonts, HTML Styles, HTML Links.
• HTML Images, HTML Tables, HTML Lists, HTML Forms, HTML Frames.
• HTML Iframes, HTML Colors, HTML Color names, HTML Color values.
• HTML Quick List, HTML Layout, HTML Doc types, HTML Head.
• HTML Meta, HTML Scripts, HTML Entities, HTML URLs, HTML URL Encode.
• HTML Media, HTML Audio, HTML Object, HTML Video, HTML YouTube, HTML Media Tags.
• HTML5 Introduction, HTML5 New Elements, HTML5 Video, HTML5 Video/DOM.
• HTML5 Audio, HTML5 Drag and Drop, HTML5 Canvas, HTML5 SVG, HTML5 Canvas vs SVG.
• HTML5 Geolocation, HTML5 Web Storage, HTML5 App Cache, HTML5 Web Workers.
• HTML5 SSE, HTML5 Tags.
XML
• Introduction to XML, Why XML? XML history and origins, An XML document is a well-formed document.
• XHTML, The XML universe, Validation & B2B, Collapse Namespaces, Sharing knowledge.
• The problem and the solution, Default namespaces, Collapse Validation and DTD Schema.
• External & Internal DTDs, DTD syntax: elements and attributes, Freedom vs. structure.
• Internal & external XML entities, Collapse Schema, Much more than an alternative to DTD.
• Namespaces in Schema (default namespace, target namespace, Schema namespace).
• Built-in data types, Simple and complex types, Elements and attributes groups, Unions and lists.
• Inheritance, User-defined types, Include and import of external Schemas, The key, keyref and unique elements.
• Collapse XPath, XPath Expressions, Operators and Special Characters, Filters and Filter Patterns.
• Comparisons, Location Paths, XPath Functions, Collapse XSL, XSL versions, The XSL processor: client & server side.
• Extracting the data from XML tree, Sorting, XSL numbers, Xpath, Creating new elements & attributes.
• Creating new documents, XSL functions, making choices, Collapse XML Application, XML programming.
• System.XML, SAX 2.0./XMLReader, XMLSerializer, the Document Object Model.
• .Net XML tools/The Apache tools set, Validating XML in Code, XSL Transformation in code PHP.
• Introduction PHP and MySQL, Benefits of using PHP MySQL.
• Setup of PHP Environment, Testing the Page, Troubleshooting Installation Errors.
• PHP Programming Concepts, Write your First PHP Program, Embed PHP in HTML / HTML in PHP.
• PHP Data Types, Variables in PHP, Super Global Variables, Operators in PHP.
• Conditional Statements, Loops (For, While, Do While, For each), PHP Functions.
• Using Functions in PHP, User defined Functions, Predefined Functions, Common Functions.
• String Functions, File Functions, Date Functions, Hash Functions, Mail Function.
• MySQL Database Training, What is Database ?, Understanding an RDBMS.
• Understanding Tables, Records, and Fields, SQL Language, Using the MySQL Command-Line Client.
• Working with MySQL Admin, Working with PHP MyAdmin.
• Creating Databases, Types of Databases, Creating Tables in Database, Specifying Field Data Types.
• Selecting the Most Appropriate Data Type, Adding Field Modifiers and Keys, Selecting a Table Type Altering Tables.
• Altering Table and Field Names, Altering Field Properties, Adding and Removing Fields and Keys.
• Altering Table Types, Backing Up and Restoring Databases and Tables, Backing Up Databases and Tables.
• Restoring Databases and Tables from Backup, Dropping Databases and Tables.
• Viewing Database, Table, and Field Information, SQL Queries.
• Inserting Records, Editing and Deleting Records, Performing Queries, Retrieving Specific Columns.
• Filtering Records with a WHERE Clause, Using Operators, Sorting Records and Eliminating Duplicates.
• Limiting Results, Using Built-In Functions, Grouping Records, Joining Tables.
• Using Subqueries, Using Table and Column Aliases, Arrays and Array Functions.
• Why use Arrays, Types of Arrays, Creating, Arrays Accessing Arrays, Array Functions, Using Array Functions.
