About the Course The course has been designed to give students an extensive overview of Cyber Security issues, tools and techniques that are critical in solving problems in cyber security domains. The course aims at providing students with concepts of computer security, cryptography, digital money, secure protocols, detection and other security techniques. The course will help students to gauge understanding in essential techniques in protecting Information Systems, IT infrastructure,analysing and monitoring potential threats and attacks, devising security architecture and implementing security solutions. The students will also have a wider perspective to information security from national security perspective from both technology and legal perspective. After completion of this course, the students should be able to understand, appreciate, employ, design and implement appropriate security technologies and policies to protect computers and digital information. Identify & Evaluate Information Security threats and vulnerabilities in Information Systems and apply security measures to real time scenarios Identify common trade-offs and compromises that are made in the design and development process of Information Systems Demonstrate the use of standards and cyber laws to enhance information security in the development process and infrastructure protection.
Skills Required There is no particular prerequisite to learn Cyber Security, you will be able to do very well, if you have these basic skills: 1. Basic Programming Knowledge 2. Good command in Maths and Statistics 3. Business Knowledge 4. Data Visualisation skills 5. Good communication skills.
Who can learn 1. Any professional from Business Analytics/ Business Intelligence background. 2. Engineering or Non-Engineering aspirants wanting to become a Data Scientist. 3. Managers from Analytics background and those who are leading a team of Analysts . 4. Any Data Analyst or Software Developer aspiring to be a Data Scientist. 5. Professionals wanting to build machine learning models, using distributed storage and distributed processing.
5.2 Types of Malware Virus, Worms, Trojans, Rootkits
5.3 OS Hardening Process Management -Memory Management, Task Management
5.4 Windows Registry/ services another configuration
5.5 Malware Analysis
5.6 Open Source/ Free/ Trial Tools: Antivirus Protection -Anti Spywares -System tuning tools, Anti Phishing
Module 6 : Security in Evolving Technology
6.1 Security in Evolving Technology:Biometrics
6.2 Mobile Computing and Hardening on android and ios IOT Security
6.3 Web server configuration and Security
6.4 Introduction, Basic security for HTTP Applications and Services -Web Services like SOAP, REST etc
6.5 Identity Management and Web Services -Authorization Patterns -Security Considerations, Challenges
6.6 Open Source/ Free/ Trial Tools: adb for android, xcode for ios
Module 7 : Cyber Laws and Forensics
7.1 Cyber Laws and Forensics:Introduction
7.2 Cyber Security Regulations, Roles of International Law - The state and Private Sector in Cyberspace
7.3 The Indian Cyberspace, National Cyber Security Policy 2013
7.4 Introduction to Cyber Forensics - Need of Cyber Forensics
7.5 Cyber Evidence, Documentation and Management of Crime Scene -Image Capturing and its importance -Partial Volume Image, Web Attack Investigations
7.6 Denial of Service Investigations, Internet Crime Investigations
7.7 Internet Forensics -Steps for Investigating Internet Crime -Email Crime Investigations
7.8 Open Source Free/ Trial Tools: Case Studies related to Cyber Law
7.9 Common Forensic Tools like dd, md5sum, shal sum, Ram dump analysis, USB device
Final Assessment20 Questions
The certificate issued for the Course will have the student's Name, Photograph, Course Title, Certificate number, Date of course completion and the name(s) and logo(s) of the Certifying Bodies. Only the e-certificate will be made available. No Hard copies. The certificates issued by uLektz Learning Solutions Pvt. Ltd. can be e-verifiable at www.ulektzskills.com/verify.
Students are required to take online assessments with eProctoring.
Students will be assessed both at the end of each module and at the end of the Course.
Students scoring a minimum of 50% in the assessments are considered for Certifications