Diploma Cyber Security Course
The Cyber Security Course examines the dangerous source and type of cyber threats, as well as potential targets and threat scenarios. Identifying, evaluating, identifying, and comprehending the danger is the only way to ensure effective cyber security. This is difficult since threat sources range from wicked people to nations and states. Cyber security online course enables you to start your career as a Cyber Security Certified Specialist by becoming certified in ISO 27000/ Information Security Management Systems (ISMS) and Ethical Hacking.
Course Overview
- Module-01 Understanding Cyber Security Threats (Cyber Security Awareness)
- Module-02 Ethical Hacking with Kali Linux (EH)
- Module-03 Penetration Testing (PenTest)
- Module-04 ISO 27000 (ISMS)
“Whether you’re new to cyber security or an experienced security professional wanting to improve your abilities, the Diploma Cyber Security programme is a great match for anybody looking to advance their career in the cyber security field.”
Course Key Learning
- The setting of goals and priorities of Cyber Security
- The definition of potential threat scenarios
- The establishment and comparison of options for action
- Learn Ethical Hacking (with hands-on labs)
- Learn Penetration Testing (with hands-on labs)
- Learn ISO 27001 Controls and Polices
- Start your career as Cyber Security – Information Security Specialist
Course Topics
Course Overview Cyber Security
Introduction to Information Security Fundamentals & Best Practices
- Cyber Security Awareness – Threats and Counter Measures
- Protecting Your Computer & its Contents
- Privacy Guidelines & Safe Internet Usage
- Ethics in Cyber Security & Cyber Law
- Intellectual Property
- Professional Ethics
- Internet Fraud
- Cybercrimes
- Secure Software & Browser Security
- Cookies & Browser Storage
- Managing a Business Information Continuity Plan
- Vulnerabilities & Controls
- Information Risk Management
- Risk Response Development & Control
- Security Policy, Compliance, & Business Continuity
- Cyber Incident Analysis & Response
Ethical Hacking
- Module 01: Introduction to Ethical Hacking
- Module 02: Foot printing and Reconnaissance
- Module 03: Scanning Networks
- Module 04: Enumeration
- Module 05: System Hacking, Kali Linux Hacking
- Module 06: Trojans and Backdoors
- Module 07: Viruses and Worms
- Module 08: Sniffers
- Module 09: Social Engineering
- Module 10: Denial of Service
- Module 11: Session Hijacking
- Module 12: Hijacking Webservers
- Module 13: Hacking Web Applications
- Module 14: SQL Injection
- Module 15: Hacking Wireless Networks
- Module 16: Evading IDS, Firewalls, and Honeypots
- Module 17: Buffer Overflow
- Module 18: Cryptography
ISO/IEC 27001 (ISMS)
- To acquire the expertise to perform an ISO/IEC 27001 internal audit following ISO 19011 guidelines
- To acquire the expertise to perform an ISO/IEC 27001 certification audit following ISO
- 9011 guidelines and the specifications of ISO 17021 and ISO 27006
- To acquire the necessary expertise to manage an ISMS audit team
- To understand the operation of an ISO/IEC 27001 conformant information security management system
- To understand the relationship between an Information Security Management System, including risk management, controls and compliance with the requirements of different stakeholders of the organization
- To improve the ability to analyze the internal and external environment of an organization, its risk assessment
INTERNATIONAL STUDENT FEE : USD 1,000 | AED 3,750 | SAR 3,750
Flexible Class Options
- Corporate Group Training | Fast-Track
- Week End Classes For Professionals SAT | SUN
- Online Classes – Live Virtual Class (L.V.C), Online Training