\

Cyber Security Training Live !

All in One Bundle!

Cyber Security Analyst Training Malayalam
Cyber Security Analyst Training
Limited Seats ! 
Instructor-led Live Training

Language: Malayalam

Trainer Support: On WhatsApp

Level: Beginner to Intermediate

Validity Period: 365 days

₹8000 80.7% OFF

₹1499 excluding VAT

Demo

Schedule:
Start Date:
12 Feb 2024
End Date: 01 March 2024 (15 Days)

Time:
7:30 PM IST to 9:30 PM IST
(Monday to Friday)

Live session recording:
Live session recording will be available for future reference or if you miss any session.

Includes Concepts + Practical Demo

Scenario based learning

Included best practices for a hands-on understanding

Trainer support for 1 Year on WhatsApp

Training Syllabus

Module 1: Introduction to Cybersecurity

  • Overview of Cybersecurity
  • Types of Hackers
  • Evolution of Cyber Threats
  • Introduction to Cybersecurity Framework
  • Understanding the Cybersecurity Framework
  • Different roles in cybersecurity
  • Responsibilities of cybersecurity professionals

Module 2: Fundamentals of Network Security

  • OSI Model
  • TCP/IP Protocol Suite
  • LAN Security
  • Firewalls and Secure Gateways
  • IDS and IPS
  • NAC
  • Proxy
  • Secure Sockets Layer (SSL)
  • Spoofing
  • DNS Attacks

Hands-on Lab: 

NGFW, IPS, Proxy, SSL Inspection, Attack Mitigation using NGFW

Module 3: Operating System Security

  • Operating Systems
  • User Account Management
  • Permission Management
  • Access Controls
  • Patch Management
  • Events and Logs
  • Endpoint Security Solutions

Hands-on Lab:
Linux OS/Windows OS Access Controls
File/Directory Permission Management
Analysing Events and Logs

Module 4: Cryptography

  • Basics of Cryptography
  • Keys and Tokens
  • Symmetric Cryptography
  • Asymmetric Cryptography
  • Hash Functions
  • SSL/TLS
  • Digital Signatures

Hands-on LAB:
Traffic inspection
Hash decoding


Module 5: Threats and Attacks

  • Attack Surface
  • Malware
  • Ransomware
  • Phishing
  • Social Engineering
  • Denial-of-Service (DoS) Attacks
  • Man-in-the-Middle Attacks
  • OWASP top 10

    Hands-on Lab:
    Phishing Demo
    Social Engineering Demo
    MITM Demo
    OWASP ZAP Proxy

Module 6: Security Policies and Procedures

  • Password Policies
  • Acceptable Use Policies
  • Authentication and Authorization
  • Least Privilege Access
  • ZTNA
  • Perimeter Security
  • Internal Network Security
  • Security Planning and Execution
  • Business Continuity
  • Security Information and Event Management (SIEM)
  • Vulnerability Assessments
  • Penetration Testing
  • Reporting and Mitigation
  • Cybersecurity Laws and Regulations

Hands-on LAB:
Least Privilage Access
Infrastructure Security Design
Open Source SIEM Tool Demo
Vulnerability Assessment

Module 7: Incident Response and Management
  • Cyber Incident Response Team
  • Incident Response Lifecycle
  • Incident Reporting
  • Forensics Basics
  • Endpoint Detection and Response
  • XDR and SOAR
Hands-On LAB:
Incident Reporting
EDR and XDR

LAB/Activities are planned in such a way that all the learners can do hands-on on their PCs. Trainer will demonstrate or guide learners to setup demo lab.
Minimum PC Hardware Specs: Intel i3 Processor/ AMD, 8 GB RAM, 40 GB HDD.
Software : Linux/Windows OS, Virtual Box/Vmware Player
Licenses: Opensource Appliances/Applications

About Cyber Security

The field of cybersecurity is dedicated to safeguarding digital systems, networks, and data from unauthorized access, attacks, and damage. Cybersecurity professionals play a crucial role in protecting individuals, organizations, and governments from cyber threats, such as malware, ransomware, phishing, and other malicious activities. They employ a range of tools, technologies, and strategies to identify vulnerabilities, implement robust security measures, and respond effectively to incidents.

Course Bundle Offers

Launch your GraphyLaunch your Graphy
100K+ creators trust Graphy to teach online
IWCampus 2024 Privacy policy Terms of use Contact us Refund policy