Course Schedule

December 21, 2024 Sat and Sun 9:00 A.M - 12:00 P.M EST -

Course Curriculum

Cyber Security and Risk Management Specialist

This course integrates four cyber security training program as listed below 

Program 1 : Network and Infrastructure Penetration Testing 

Program 2 : Comptia Security+

Program 3 : Cyber Security Specialist ( CISSP)

Program 4: Cyber Security - SOC

High-level Course outline:

Phase 1: Foundation Training     

Module 1        Overview of enterprise applications and N-Tier Infrastructure        

Module 2        Operating System –Windows Server 2012/2016, UNIX        

Module 3        Networking, Active Directory and DNS         

Module 4        Power Shell Scripting, Batch Scripting           

Module 5        Incident, Problem and Change Management process

 

Module 6         Infrastructure setup 

  • Installation of Virtual Machine on Physical Server
  • Installation of Virtual Machine on Cloud
  • Configure VPN
  • Connect Remote  Windows Servers
  • Connect Remote Unix Server

Phase 2: Security Management     

Module 7

  • Identifying Security Fundamentals
  • Identify Information Security Concepts
  • Identify Basic Security Controls
  • Identify Basic Authentication and Authorization Concepts
  • Identify Basic Cryptography Concepts

Module 8

  • Analyzing Risk       
    • Analyze Organizational Risk
    • Analyze the Business Impact of Risk

Module 9

  • Identifying Security Threats     
  • Identify Social Engineering Attacks
  • Identify Malware
  • Identify Software-Based Threats
  • Identify Network-Based Threats
  • Identify Wireless Threats
  • Identify Physical Threats

Module 10

  • Conducting Security Assessments      
  • Identify Vulnerabilities
  • Assess Vulnerabilities
  • Plan for remediation of findings

Module 11

  • Implementing Host and Software Security  
  • Implement Host Security
  • Implement Cloud and Virtualization Security
  • Implement Mobile Device Security
  • Incorporate Security in the Software Development Lifecycle

Module 12

  • Implementing Network Security         
  • Configure Network Security Technologies
  • Secure Network Design Elements
  • Implement Secure Networking Protocols and Services
  • Secure Wireless Traffic

 

Module 13

  • Managing Identity and Access 
  • Implement Identity and Access Management
  • Configure Directory Services
  • Configure Access Services
  • Manage Accounts

Module 14

  • Implementing Cryptography
  • Identify Advanced Cryptography Concepts
  • Select Cryptographic Algorithms
  • Configure a Public Key Infrastructure
  • Enroll Certificates
  • Back Up and Restore Certificates and Private Keys
  • Revoke Certificates

Module 15

  • Implementing Operational Security  
  • Evaluate Security Frameworks and Guidelines
  • Incorporate Documentation in Operational Security
  • Implement Security Strategies
  • Manage Data Security Processes
  • Implement Physical Controls

Module 16

  • Addressing Security Incidents 
  • Troubleshoot Common Security Issues
  • Respond to Security Incidents
  • Investigate Security Incidents

Module 17

  • Ensuring Business Continuity   
  • Select Business Continuity and Disaster Recovery Processes
  • Develop a Business Continuity Plan

Module 18

  •  Network Penetration Test
  • Plan for Network Penetration Testing
  • External Network Penetration Testing
  • Internal Network Penetration Testing
  • Wireless Network Penetration Testing
  • Generate Report for Network Penetration Testing

Module 19 

  • Application Penetration Test
  • Plan for application Penetration Testing
  • External Application Penetration Testing
  • Internal Application Penetration Testing
  • Generate Report for Application Penetration Testing

Module 20

  • DDoS
  • Overview of DDoS
  • How to onboard an application under DDoS
  • Monitoring Application under DDoS

Module 21

  • Web Application Firewall (WAF)
  • Overview of WAF
  • How to onboard an application under WAF
  • Monitoring Application under WAF
  • WAF Blocking mode vs alert mode

Module 22

  • Policies, Standards, Guideline
  • Overview of Policies ,Standards and Guidelines
  • ISO format
  • Application Security policy ,standards
  • Network Security policy, standards

Phase 3: Real-World Project

Module 23   Boot Camp

•          Boot Camp with real-world project - Each student will be required to complete a real-time project lab that covers the entire course curriculum.

Phase 4: Job Marketing     

Module 24   Real-world Job Interview Preparation

•          Professional real-world Resume Writing

•          Project Analysis

•          Interview Preparation

•          Mock Interview

Description

This fully online program will provide graduates with the key concepts of information security, technical and practical job skills necessary to secure, protect and defend network infrastructures and an organization's valuable data assets.

Students will gain a broad understanding of cyber security concepts, industry best practices for information security and key security concepts to protect an organization against fraud, data breaches and other vulnerabilities.

The Cyber Security program is designed to prepare information and digital security professionals with the ability to manage, provide policies, standards, procedures, guidelines, policy framework, assess and mitigate risk and integrate advanced security solutions.

The growing internet security sector requires an in-depth understanding of cyber security issues and fundamental internet architecture and protocols. In addition, network security skills such as packet, vulnerability, exploit analysis, and cyber security research will also be discussed.

Graduates will develop highly marketable skills as analysts and security specialists in the cyber security field.

Cyber Security Market Scope:

  • Cybersecurity jobs are in high demand. According to the Bureau of Labor Statistics, the rate of growth for jobs in information security is projected at 37% from 2012–2022 that’s much faster than the average for all other occupations. Obtaining work in this industry can mean a great income, job security, and advancement potential. There are many business opportunities, including company management positions, available for professional hackers in today's workforce.

The Highest-Paid Cybersecurity Jobs:

  • Application Security Engineer: This cybersecurity role tops the list with an average salary range that falls between $100,000 to $210,000, according to Salary Outlook guide.
  • Network Security Analyst: Another of the highest-paid cybersecurity jobs, Network Security Analysts make on average between $90,000 and $150,000.
  • Cybersecurity Analyst: The average annual salary for this cybersecurity title falls between $90,000 and $185,000.
  • Penetration Tester: The Penetration Tester role nets an average salary between $80,000 and $130,000.
  • IS Security Engineer: This role nets an average salary range of $90,000 to $150,000.

Benefit of the Course:

  • Better Job Opportunities: If you are looking for a new job, completion of this course, you can apply as a Cyber Security Specialist/Engineer/ IS Security Engineer/Security Analyst
  • Improved Skills & Knowledge: If you are already a QA/IT professional, completion of this course will improve your skills to latest technologies.
  • Increased Salary: Cyber Security professionals are the highest paid in the IT industry.

Who should Attend?

  • Anyone who wants to start Cyber Security Specialist as a career
    Anyone who wants to upgrade the IT Skills 
  • Software Test Engineer
  • Performance Test Engineer
  • Database/Network Administrator

Program outcomes

  • Develop and implement cyber security solutions considering the affordances and limitations of the computer operating systems, networks, application software, and packages available.
  • Design cyber security solutions for business processes and applications to protect business resources.
  • Outline the processes and procedures involved in the maintenance and deployment of cyber security solutions.
  • Develop cyber security strategies and processes for business communications that respond to the needs of all the internal stakeholders.
  • Design and implement cyber security solutions in compliance with security policies, standards, and regulations within the organization.
  • Plan, implement, and evaluate cyber security policies and strategies using project management principles to effectively respond to the needs of the organization's information security requirements.
  • Evaluate the effectiveness of a cyber-security system through security audits to identify and correct security issues.
  • Develop and deliver appropriate internal cyber security training to ensure compliance with security policies.
  • Communicate cyber security protocols, policies, and audit results and related documentation to any level of the organization.

Prerequisites:

Students who completed at least one computer training program or have some work experience in IT field with some knowledge in computer Networking or Programming.


Class Schedule:

 SAT and SUN     9:00 AM to 2:00 PM   

 MON and WED 7:00 PM to 11:00 P.M 

 TUE and THU   7:00 P.M to 11: 00 P.M

 

Course Catalog

Please Click to View The Catalog :       Download