-
Module 1: Network Attacks and Defense Strategies
This module introduces you to different network-based attacks faced by the organization to understand their working and develop defense strategies. -
Module 2: Administrative Network Security
This module involves developing or updating security infrastructure and continuously monitoring networks for any suspicious actions or unauthorized access -
Module 3: Technical Network Security
This module involves implementing authentication and protection controls for user verification to avoid theft of sensitive information or data. Introducing the concept of zero trust and its effectiveness in maintaining a better security posture. -
Module 4: Network Perimeter Security
This module involves implementation and management of perimeter devices like firewalls, Intrusion Detection Systems, Intrusion Prevention Systems -
Module 5: Endpoint Security-Windows Systems
This module involves security of end-user devices and entry points by implying endpoint security on Windows devices. -
Module 6: Endpoint Security-Linux Systems
This module involves Endpoint Security-Linux Systems: Securing entry points or end-user devices by ensuring endpoint security on Linux devices -
Module 7: Endpoint Security- Mobile Devices
This module involves securing entry points or end-user devices by ensuring endpoint security on mobile devices -
Module 8: Endpoint Security-IoT Devices
This module involves fundamentals of IoT, IoT threats and security using endpoint security implementation -
Module 9: Administrative Application Security
Understand the methodologies of administrative application security and its importance to minimize the security-related vulnerabilities in the application -
Module 10: Data Security
Implement policies to safeguard data from unauthorized access using various techniques like encryption, hashing, tokenization, and other key management practices. Concept of data storage, data classification, data masking, retention and destruction. -
Module 11: Enterprise Virtual Network Security
Gain in-depth understanding of virtualization, related threats, and security. Essentials of software-defined network (SDN) security, network function virtualization (NFV) security. -
Module 12: Enterprise Cloud Network Security
Get introduced to cloud computing, threats, challenges and security across cloud platforms, concepts of container security, docker security, and Kubernetes security. -
Module 13: Enterprise Wireless Network Security
Gain understanding of wireless network security essentials, threats, attacks, and countermeasures. -
Module 14: Network Traffic Monitoring and Analysis
This module involves analysis and monitoring of logs from various perimeter network devices to identify any anomalies in the traffic. -
Module 15: Network Logs Monitoring and Analysis
Analyze the events generated by various devices in the network to identify signs of any suspicious activity or a potential incident. -
Module 16: Incident Response and Forensic Investigation
Understand incident management response process and methodologies to be followed in case of security incidents. Understanding of forensics investigation techniques and tools used for analysis. -
Module 17: Business Continuity and Disaster Recovery
Understand the importance of BCP and DR, related concepts and procedures required to allow smooth functioning of operations in case of a disaster. -
Module 18: Risk Anticipation with Risk Management
This module involves a risk management process, analyzing various risks that the organization is susceptible to and developing policies to manage them. -
Module 19: Threat Assessment with Attack Surface Analysis
Analyze the threats and attack vectors to develop solutions for their countermeasures. -
Module 20: Threat Prediction with Cyber Threat Intelligence
Develop a proactive approach by understanding various frameworks aiding in threat intelligence to anticipate the kinds of attacks hackers could use to gain access to the network.