Cyber Security Training

(3) 3 Ratings

Course Schedule

30

JUL

Mon - Sat

07:30 PM - 10:00 PM ( IST )

06

AUG

Mon - Fri

11:00 AM - 02:00 PM ( IST )

11

AUG

Sat - Sun

05:30 AM - 06:30 AM ( IST )


Total Learners

1150 Learners


LMS Access

365 days

Course duration

30 days


Support

24/7 support

Can't find convenient schedule?

Our experts can help you find a batch that meets your needs

The Instructor for this course is from one of the Big5 Companies in the world.

Drop us a Query

I agree to the Training T&C

Modes of Training

Corporate Training

Live, Classroom Or Self Paced Training

Online Classroom

Attend our Instructor Led Online Virtual Classroom

Self Paced Training

Comprehensive Recorded Videos by Experts to learn at your own pace

Course Features

Live Instructor-led Classes

This isn't canned learning. Its dynamic, its interactive, its effective

Expert Educators

Only the best or they're out. We are constantly evaluating our trainers

24&7 Support

We never sleep. Need something answered at 3 am? No Problem

Flexible Schedule

You don't learn as per our calendar. We work according to yours

☰ Details

Course Curriculum

Security Essentials

  • Need of Cyber Security
  • CIA Triad
  • Vulnerability, Threat and Risk
  • Risk Governance & Risk Management
  • Security Architecture
  • Security Governance
  • Security Auditing
  • Compliance
  • Computer Security Architecture & Design.

Computer Networks & Security

  • Network architecture, protocols, and technologies: Layered architecture, Open Systems Interconnect (OSI) Model
  • Transmission Control Protocol/Internet Protocol (TCP/IP)
  • Hybrid TCP/IP Model
  • Application Layer Protocols: HTTP, SNMP, DNS, POP, SMTP
  • Transport layer protocols: Transmission Control Protocol (TCP), User Datagram Protocol (UDP)
  • Network/Internet layer protocols: Internet Protocol (IP) v4, IPv6, IPsec protocols
  • Link layer protocols: Address Resolution Protocol (ARP) / Reverse ARP / Proxy ARP, Ethernet, VLAN.

Data & Endpoint Security

  • Data Security
  • Data Security Controls
  • Endpoint Security
  • Host/ Endpoint Security Controls.

Cloud Security

  • Cloud Computing Architectural Framework
  • Concerns & Best Practices
  • Governance and Enterprise Risk Management
  • Legal Issues: Contracts and Electronic Discovery
  • Compliance and Audit Management
  • Information Management and Data Security
  • Interoperability and Portability
  • Traditional Security, Business Continuity, and Disaster Recovery
  • Data Centre Operations
  • Incident Response
  • Application Security
  • Encryption and Key Management
  • Identity, Entitlement, and Access Management
  • Virtualization
  • Security as a Service.

Advanced Concepts

CISSP

  • Introduction
  • Security and Risk Management
  • Asset Security
  • Security Engineering
  • Communications and Network Security
  • Identity and Access Management
  • Security Assessment and Testing
  • Security Operations
  • Software Development Security

CISA

  • Introduction
  • Process of Auditing Information Systems
  • Governance and Management of IT
  • Information Systems Acquisition, Development and Implementation
  • Information Systems Operations and Maintenance
  • Protection of Information Assets.

Ethical Hacking Training

CISM

  • Introduction to CISM
  • Information Security Governance
  • Information Risks Management and Compliance
  • Information Security Program Development and Management
  • Information Security Incident Management

CRISC

  • Introduction to CRISC
  • Risk Identification
  • Risk Assessment
  • Risk Response
  • Risk and Control Monitoring and Reporting.

Phases of a Cyber Attack

  • Phase 1 —Reconnaissance: Adversary identifies and selects a target
  • Phase 2 —Weaponize: Adversary packages an exploit into a payload designed to execute on the targeted computer/network
  • Phase 3 —Deliver: Adversary delivers the payload to the target system
  • Phase 4 —Exploit: Adversary code is executed on the target system
  • Phase 5 —Install: Adversary installs remote access software that provides a persistent presence within the targeted environment or system
  • Phase 6 —Command and Control: Adversary employs remote access mechanisms to establish a command and control channel with the compromised device
  • Phase 7 —Act on Objectives: Adversary pursues intended objectives e.g., data exfiltration, lateral movement to other targets.

Security Processes in practice for Businesses

  • Key Security Business Processes
  • Corp. & Security Governance
  • IT Strategy management
  • Portfolio/Program/Project management
  • Change management
  • Supplier (third party) management
  • Problem management
  • Knowledge management
  • Info-sec management
  • BCP
  • IT Operations management
  • Overview of top 20 security controls.

Course Description

What are Objectives for this Training Course?

  • This course is designed to cover a holistic & a wide variety of foundational topics of the cybersecurity domain which will be helpful to lead freshers as well as IT professional having 1 to 2 years of experience, into the next level of choice such as ethical hacking/ audit & compliance / GRC/ Security Architecture and so on
  • This course focuses mainly on the basics concepts of Cyber Security
  • In this course, we are going to deal with Ground level security essentials cryptography, computer networks & security, application security, data & endpoint security, idAM (identity & access management), cloud security, cyber-attacks and various security practices for businesses
  • This course will be your first step towards learning Cyber Security.

Who should go for this training?

  • Networking Professionals
  • Linux Administrators

What are Pre-requisites for this Training Course?

  • There are no prerequisites for Cyber security certification course. Basic knowledge of networking and cloud will be beneficial. 

FAQ

Do you have self paced training?

Yes, we offer self paced training

How do you provide training?

We offer three different modes of training. Instructor Led Live Training, Self Paced Training and Corporate Training

Do you offer any discounts?

Yes we offer discounts for group of 3 plus people.

Can I choose timings that suits my schedule?

Yes we are the only company where we work with students and offer flexible timings which fits your schedule

Who are the Instructors?

All our instructors are from MNC companies who have real time experience of more than 10 years.

Can I attend a demo session before joining?

Yes we offer a free demo session with the instructors. The trainer will answer all your queries and share the course agenda.

Course Reviews

Avinash

Knowledgeable Presenters, Professional Materials, Excellent Customer Support what else can a person ask for when acquiring a new skill or knowledge to enhance their career. Thank you LTB.

Satya

Had a Great Experience in learning with LTB. Instructor was a Real Time expert guy explained us more examples. Thank you LTB.

Siva

I am thankful to Live Trainings Bangalore which is one of the best Educational organization. I have undergone two highly rated courses (Big data and Hadoop, Spark and Scala). Now i am doing well with the stuff learnt, after getting certified for big data and hadoop, I'm getting many offers from many companies. Thank you LTB.