ArivuPro Skills
+916364925600
skills@arivupro.com
Menu
Home
Courses
Analytics Courses
Data Science
Data Analytics
Business Analytics
AI & ML
Tech Courses
Cyber Security
Advanced Excel with AI Integration
Microsoft Power Point
Microsoft Word
Marketing Courses
Digital Marketing
SEO
SEM
Adobe Premiere Pro Professional Certificate
Young Employability Scholar Program
Finance Courses
Financial Modelling
SAP FICO
Taxation Mastery Course
ZOHO Books
Finance Essentials for Non- Finance
Tally Prime
About Us
Offline
Blogs
Contact Us
Career
Admission
ZOHO Books
Curriculum
9 Sections
36 Lessons
100 Hours
Expand all sections
Collapse all sections
Module 1: Introduction to Cyber Security
4
1.1
Understanding Cyber Security: Importance, domains, and current landscape
1.2
Key Concepts: Threats, vulnerabilities, risks, and attack vectors
1.3
Types of Cyber Attacks: Malware, phishing, ransomware, DDoS, and insider threats
1.4
Cyber Security Careers: Roles like analyst, ethical hacker, and security engineer
Module 2: Networking Fundamentals for Security
4
2.1
Basic Networking Concepts: IP, DNS, MAC, ports, and protocols
2.2
OSI & TCP/IP Models: Understanding data flow across layers
2.3
Network Devices & Topologies: Routers, switches, firewalls, and their roles
2.4
Secure Communication: VPNs, proxies, and tunneling techniques
Module 3: System and Application Security
4
3.1
Operating System Security: Windows and Linux hardening techniques
3.2
Securing Web Applications: OWASP Top 10 threats and mitigation
3.3
Patch Management: Importance and tools for timely updates
3.4
Endpoint Protection: Antivirus, anti-malware, and EDR tools
Module 4: Cryptography Essentials
4
4.1
Introduction to Cryptography: Importance and real-world use cases
4.2
Symmetric vs Asymmetric Encryption: AES, RSA, and hashing algorithms
4.3
Digital Signatures and Certificates: Ensuring integrity and authenticity
4.4
Secure Data Transmission: HTTPS, TLS/SSL, and secure key exchange
Module 5: Ethical Hacking and Penetration Testing
4
5.1
Ethical Hacking Basics: Legal framework and scope
5.2
Phases of Pen Testing: Reconnaissance, scanning, exploitation, post-exploitation
5.3
Tools of the Trade: Nmap, Metasploit, Burp Suite, Wireshark
5.4
Vulnerability Assessment: Using automated tools and manual techniques
Module 6: Security Operations and Incident Response
4
6.1
Security Operations Center (SOC): Roles and workflows
6.2
SIEM Tools: Introduction to tools like Splunk, IBM QRadar, or Elastic Stack
6.3
Threat Hunting and Intelligence: Indicators of compromise and threat feeds
6.4
Incident Handling Process: Identification, containment, eradication, and recovery
Module 7: Cloud Security and Virtualization
4
7.1
Introduction to Cloud Models: SaaS, PaaS, IaaS explained
7.2
Cloud Security Best Practices: Shared responsibility model and configurations
7.3
Identity & Access Management: MFA, SSO, and role-based access
7.4
Security in AWS, Azure, and GCP: Key tools and services
Module 8: Compliance, Governance & Risk Management
4
8.1
Information Security Policies: Purpose and creation
8.2
Major Compliance Frameworks: GDPR, ISO 27001, PCI-DSS
8.3
Risk Management Lifecycle: Identification, analysis, evaluation, treatment
8.4
Business Continuity and Disaster Recovery: Planning and execution
Module 9: Cyber Security Tools and Hands-On Labs
4
9.1
Hands-on Labs: Using Kali Linux and virtual labs
9.2
Threat Simulation: Conducting mock attacks and defenses
9.3
Real-World Scenarios: Analyzing past cyber breaches
9.4
Final Project: Design and implement a secure network and response plan
This content is protected, please
login
and
enroll
in the course to view this content!
Fill this form and get email id, phone no of the company
Get Your Job Details Now
First Name
Last Name
Email
Phone
Submit Form
×
×
Modal title
Main Content