-
Course 1 - Introduction to Cyber Security
The Introduction to Cyber Security course for beginners is designed to give you a foundational look at today’s cybersecurity landscape and provide you with the tools to evaluate and manage security protocols in information processing systems.
-
Course 2 - CompTIA Security+ 501
CompTIA Security+ is a globally trusted certification that validates foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification training covers the essential principles of network security and risk management.
- Lesson 1 – Risk Management
- Lesson 2 – Crytography
- Lesson 3 – Identity and Access Management
- Lesson 4 – Tools of the Trade
- Lesson 5 – Securing Individual Systems
- Lesson 6 – The Basic LAN
- Lesson 7 – Beyond the Basic LAN
- Lesson 8 – Secure Protocols
- Lesson 9 – Testing Your Infrastructure
- Lesson 10 – Dealing with Incidents
-
Lesson 3 - CEH (v11) - Certified Ethical Hacker
CEH (v11)- Certified Ethical Hacker This Certified Ethical Hacker-Version 11 (earlier CEHv10) course will train you on the advanced step-by-step methodologies that hackers actually use, such as writing virus codes, and reverse engineering, so you can better protect corporate infrastructure from data breaches. This ethical hacking course will help you master advanced network packet analysis and advanced system penetration testing techniques to build your network security skill-set and beat hackers at their own game.
- Lesson 1 – Introduction to Ethical Hacking – Overview of information security, threats, attack vectors, ethical hacking concepts, information security controls, penetration testing concepts, and information security laws and standards are covered in this module
- Lesson 2 – Footprinting and Reconnaissance – These modules cover concepts and types of footprinting, footprinting through search engines, web services, and social networking sites, footprinting tools, countermeasures, and footprinting pen testing
- Lesson 3 – Scanning Networks – Learn about network scanning concepts, tools and techniques, network diagrams, and scanning pen testing
- Lesson 4 – Enumeration – Enumeration concepts, types, techniques, and pen testing are covered in this module
- Lesson 5 – Vulnerability Analysis – Overview of vulnerability assessment concepts, solutions, scoring systems, tools, and reports are explained in this module
- Lesson 6 – System Hacking – Learn how to crack passwords, hide files, cover tracks, any many more
- Lesson 7 – Malware Threats – This module gets you familiar with malware concepts, trojan concepts, malware analysis, countermeasures, malware penetration testing
- Lesson 8 – Sniffing – Sniffing concepts, tools, and techniques are explained in this module
- Lesson 9 – Social Engineering – Comprehend social engineering concepts, techniques, countermeasures, and pen testing
- Lesson 10 – Denial-of-service – Dos/DDoS concepts, techniques, tools, case studies, and penetration testing are covered in this module
- Lesson 11 – Session Hijacking – Know what is session hijacking and its types, tools, countermeasures, and session hijacking penetration testing
- Lesson 12 – Evading IDS, Firewalls, and Honeypots – Learn about firewalls and honeypots and how to detect and evade them
- Lesson 13 – Hacking Web Servers – This module focuses on web server concepts, attacks, methodologies, tools, countermeasures, and penetration testing
- Lesson 14 – Hacking Web Applications – Web app concepts, tools, methodologies, countermeasures, and penetration testing are covered in this module
- Lesson 15 – SQL Injection – Get familiar with SQL Injection concepts, types, tools, methodologies, countermeasures, and penetration testing
- Lesson 16 – Hacking Wireless Networks – Wireless concepts, threats, methodologies are covered in this module
- Lesson 17 – Hacking Mobile Platforms – Learn how to hack android IOS, Mobile spyware, device management, security tools, and many more in this module
- Lesson 18 – IoT Hacking – This module covers IoT Hacking concepts, attacks, methodologies, tools, countermeasures, and penetration testing
- Lesson 19 – Cloud Computing – Concepts, attacks, methodologies, tools, countermeasures, and penetration testing of cloud computing are covered in this module
- Lesson 20 – Cryptography – This module will teach you about cryptography concepts, encryption algorithms, tools, PKI, types of encryption, cryptanalysis, and countermeasures
-
Course 4 - Certified Information Security Manager (CISM®)
CISM (Certified Information Security Manager) is a key certification for information security professionals who manage, design, oversee, and assess enterprise information security. This CISM certification course, closely aligned with ISACA's best practices, helps you learn about IT security systems.
- Lesson 1 – Information Security Governance – Understand the broad requirements for effective information security governance, the elements and actions required to develop an information security strategy, and be able to formulate a plan of action to implement this strategy.
- Lesson 2 – Information Risk Management and Compliance – Establish a process for information asset classification and ownership and Identify legal, regulatory, organizational and other applicable requirements to ensure that risk assessments, vulnerability assessments, and threat analysis are conducted periodically.
- Lesson 3 – Information Security Program Development and Management – Develop and manage an information security plan.
- Lesson 4 – Information Security Incident Management – Manage information security within an enterprise and develop policies and procedures to respond to and recover from disruptive and destructive information security events.
-
Course 5 - Certified Information Systems Security Professional (CISSP®)
The Certified Information Systems Security Professional (CISSP) certification is considered the gold standard in the field of information security. This CISSP training is aligned with (ISC)² CBK 2018 requirements and will train you to become an information assurance professional who defines all aspects of IT security, including architecture, design, management, and controls. Most IT security positions require or prefer a CISSP certification, so get started with your CISSP training today.
- Lesson 1 – Introduction to CISSP – Overview of CISSP, CISSP Exams, ISC2 is covered in this lesson
- Lesson 2 – Security and Risk Management – Information security management, risk analysis, legal systems, IP laws, BCA, CIA, etc are covered in this lesson
- Lesson 3 – Asset Security – Learn how to classify information, protect privacy, maintain ownership, establish handling requirements
- Lesson 4 – Security Engineering – Understand security engineering processes using secure design principles, Architecture Frameworks, Security Models Evaluation Criteria, Distributed Systems, and many more
- Lesson 5 – Communications and Network Security – Learn how to secure network architecture, design, components, and communication channels
- Lesson 6 – Identity and Access Management – Implement and manage authorization mechanisms to prevent or mitigate access control attacks
- Lesson 7 – Security Assessment and Testing – Learn how to design and validate assessment and test strategies
- Lesson 8 – Security Operations – Understand and support requirements for investigations by implementing resource protection techniques and incident response
- Lesson 9 – Software Development Security – Comprehend the system life cycle and system development in this lesson
-
Course 6 - Certified Cloud Security Professional (CCSP®)
The Certified Cloud Security Professional (CCSP) training course is the leading certification by (ISC)² and will teach you to negate security threats to your cloud storage by understanding information security risks and strategies to maintain data security. Covering the six sections of the Official (ISC)² CCSP Common Body of Knowledge (CBK®), this course will help you pass the exam obtaining your CCSP.
- Lesson 01 – Cloud Introduction
- Lesson 2 – Architectural concepts and design requirements – Understand cloud computing concepts, cloud reference architecture, design principles of secure cloud computing
- Lesson 3 – Cloud Data Security – Comprehend and apply Cloud Data Lifecycle, data security strategies, data discovery and classification technologies, data rights management, and many more
- Lesson 4 – Cloud Platform and Infrastructure Security – Analyze risks associated to cloud infrastructure, design and plan security controls and disaster recovery
- Lesson 5 – Cloud Application Security – Learn about Software Development Life-cycle(SDLC) process, specifics of cloud application architecture, and many more in this domain
- Lesson 6 – Could Security Operations
- Lesson 7 – Legal and Compliance – Understand legal requirements, privacy issues, audit process, cloud contract design