Course Schedule

Sep 05, 2020 Saturday and Sunday 9:00 AM - 1:00 PM EST -

Course Curriculum

Cyber Security and Risk Management Specialist

This course integrates four cyber security training program as listed below 

Program 1 : Network and Infrastructure Penetration Testing 

Program 2 : Comptia Security+

Program 3 : Cyber Security Specialist ( CISSP)

Program 4: Cyber Security - SOC

High-level Course outline:

Phase 1: Foundation Training     

Module 1        Overview of enterprise applications and N-Tier Infrastructure        

Module 2        Operating System –Windows Server 2012/2016, UNIX        

Module 3        Networking, Active Directory and DNS         

Module 4        Power Shell Scripting, Batch Scripting           

Module 5        Incident, Problem and Change Management process

 

Module 6         Infrastructure setup 

  • Installation of Virtual Machine on Physical Server
  • Installation of Virtual Machine on Cloud
  • Configure VPN
  • Connect Remote  Windows Servers
  • Connect Remote Unix Server

Phase 2: Security Management     

Module 7

  • Identifying Security Fundamentals
  • Identify Information Security Concepts
  • Identify Basic Security Controls
  • Identify Basic Authentication and Authorization Concepts
  • Identify Basic Cryptography Concepts

Module 8

  • Analyzing Risk       
    • Analyze Organizational Risk
    • Analyze the Business Impact of Risk

Module 9

  • Identifying Security Threats     
  • Identify Social Engineering Attacks
  • Identify Malware
  • Identify Software-Based Threats
  • Identify Network-Based Threats
  • Identify Wireless Threats
  • Identify Physical Threats

Module 10

  • Conducting Security Assessments      
  • Identify Vulnerabilities
  • Assess Vulnerabilities
  • Plan for remediation of findings

Module 11

  • Implementing Host and Software Security  
  • Implement Host Security
  • Implement Cloud and Virtualization Security
  • Implement Mobile Device Security
  • Incorporate Security in the Software Development Lifecycle

Module 12

  • Implementing Network Security         
  • Configure Network Security Technologies
  • Secure Network Design Elements
  • Implement Secure Networking Protocols and Services
  • Secure Wireless Traffic

 

Module 13

  • Managing Identity and Access 
  • Implement Identity and Access Management
  • Configure Directory Services
  • Configure Access Services
  • Manage Accounts

Module 14

  • Implementing Cryptography
  • Identify Advanced Cryptography Concepts
  • Select Cryptographic Algorithms
  • Configure a Public Key Infrastructure
  • Enroll Certificates
  • Back Up and Restore Certificates and Private Keys
  • Revoke Certificates

Module 15

  • Implementing Operational Security  
  • Evaluate Security Frameworks and Guidelines
  • Incorporate Documentation in Operational Security
  • Implement Security Strategies
  • Manage Data Security Processes
  • Implement Physical Controls

Module 16

  • Addressing Security Incidents 
  • Troubleshoot Common Security Issues
  • Respond to Security Incidents
  • Investigate Security Incidents

Module 17

  • Ensuring Business Continuity   
  • Select Business Continuity and Disaster Recovery Processes
  • Develop a Business Continuity Plan

Module 18

  •  Network Penetration Test
  • Plan for Network Penetration Testing
  • External Network Penetration Testing
  • Internal Network Penetration Testing
  • Wireless Network Penetration Testing
  • Generate Report for Network Penetration Testing

Module 19 

  • Application Penetration Test
  • Plan for application Penetration Testing
  • External Application Penetration Testing
  • Internal Application Penetration Testing
  • Generate Report for Application Penetration Testing

Module 20

  • DDoS
  • Overview of DDoS
  • How to onboard an application under DDoS
  • Monitoring Application under DDoS

Module 21

  • Web Application Firewall (WAF)
  • Overview of WAF
  • How to onboard an application under WAF
  • Monitoring Application under WAF
  • WAF Blocking mode vs alert mode

Module 22

  • Policies, Standards, Guideline
  • Overview of Policies ,Standards and Guidelines
  • ISO format
  • Application Security policy ,standards
  • Network Security policy, standards

Phase 3: Real-World Project

Module 23   Boot Camp

•          Boot Camp with real-world project - Each student will be required to complete a real-time project lab that covers the entire course curriculum.

Phase 4: Job Marketing     

Module 24   Real-world Job Interview Preparation

•          Professional real-world Resume Writing

•          Project Analysis

•          Interview Preparation

•          Mock Interview

Description

Cyber Security  Market Scope:

Cybersecurity jobs are in high demand. According to the Bureau of Labor Statistics, the rate of growth for jobs in information security is projected at 37% from 2012–2022 that’s much faster than the average for all other occupations. Obtaining work in this industry can mean a great income, job security, and advancement potential. There are many business opportunities, including company management positions, available for professional hackers in today's workforce.

The Highest-Paid Cybersecurity Jobs:

  • Application Security Engineer: This cybersecurity role tops the list with an average salary range that falls between $100,000 to $210,000, according to Salary Outlook guide.
  • Network Security Analyst: Another of the highest-paid cybersecurity jobs, Network Security Analysts make on average between $90,000 and $150,000.
  • Cybersecurity Analyst: The average annual salary for this cybersecurity title falls between $90,000 and $185,000.
  • Penetration Tester: The Penetration Tester role nets an average salary between $80,000 and $130,000.
  • IS Security Engineer: This role nets an average salary range of $90,000 to $150,000.

Benefit of the Course:

>>  Better Job Opportunities: If you are looking for a new job, completion of this course, you can apply as a Cyber Security Specialist/Engineer/ IS Security Engineer/Security Analyst

>>  Improved Skills & Knowledge: If you are already a QA/IT professional, completion of this course will improve your skills to latest technologies.

>>  Increased Salary: Cyber Security professionals are the highest paid in the IT industry.

Who should Attend?

>> Anyone who wants to start Cyber Secuirty Specialist as a career
>> Anyone who wants to upgrade the IT Skills 
>> Software Test Engineer
>> Performance Test Engineer
>> Database/Network Administrator

Prerequisites:

  1. Students who completed at least one computer training program or have some work experience in IT field with some knowledge in computer Networking or Programming.


Class Schedule:  SAT and SUN  9:00AM to 2:00PM   | MON and WED 7:00PM to 11:00P.M  | TUE and THU 7:00P.M to 11:00P.M

 

 

Course Catalog

Please Click to View The Catalog :       Download