Course Overview
Cybersecurity is important because it protects all categories of data from theft and damage. This includes sensitive data, personally identifiable information (PII), protected health information (PHI), personal information, intellectual property, data, and governmental and industry information systems. This course aims to provide a platform for Cyber Security Aspirants by providing Training on Endpoint Security, Network Security and Virtualization. The course focus to cover these topics theoretically and practically. This course provides a range of career opportunities in Cyber Security Sectors as Network Security Engineer, Cyber Security Analyst, Security Analyst, Endpoint Security Engineer, Cyber Threat Analyst, Information Security Analyst, IT Security Analyst, Security Systems Administrator and many more.
Course Objectives
The course is designed in a way that a candidate can identify, analyze and remediate computer security breaches by learning and implementing the real-world scenarios.
- Threats related to endpoints and solutions to help defend from all kinds of attacks
- Exhibit knowledge to secure corrupted systems, protect data and secure computer networks in an organization
- Learn and Practice to design and implement security solutions
- Implement security solutions for endpoints, networks, VPN
Learning Outcomes
- Analyze and resolve security issues in networks and computer systems to secure an IT infrastructure.
- Develop policies and procedures to manage enterprise security risks.
- Install and configure virtualization technology such as VMware.
- Deploy, manage, and migrate virtual machines
- The learner will be trained for Job roles in cyber security such as Network Security Engineer, Cyber Security Analyst, Security Analyst, Endpoint Security Engineer, Cyber Threat Analyst, Information Security Analyst, IT Security Analyst, Security Systems Administrator and many more.
Course Curriculum
Module 1 – Security Basics
- Introduction to Cybersecurity
- Knowing Threats
- Hardening of system and network to stop threats
- Authentication Models
- Knowing Vulnerability or VAPT
- Security Control Defensive Technologies
- Perimeter Security
- Datacenter Security
- Building security framework and Compliance
- Event Logging and Incident Monitoring & Management
Module 2 – Endpoint Security
- Endpoint Protection
- Threat Detection
- Log Management and Event Co-relation
- Automated Investigation & Response
- Incident Monitoring & Reporting
- Deployment Options (Windows, Linux & MAC)
- Security & IT Operations
- Ideal Setting
- Profile Settings
- Manage Global Users
- Analysis
- Third Party Integration
Module 3 – Network Security
- What is a Firewall?
- Working of Firewall/Packet Flow
- Organization Requirements
- Walkthrough to Firewall Console
- Firewall Core Features
- Basic Configuration
- Firewall Connectivity through different modes
- What is VDOM and its types?
- Firewall Rules Configuration
- Firewall Log Management / Syslog configuration
- Firewall deployment mode and its types
- Firewall backup
- NAT and its types
- Certificate inspection and its types/uses
- LDAP/TACAS Integration with Firewall
- VPN and its types
- Quality of Service, Traffic Shaping
- Security profiles
Module 4 – VPN & Virtualization
- Introduction to VPN
- Types of VPN
- VPN Client Installation
- VPN Server Installation
- SSO Policy
- Virtualization
- VDI (Virtual Desktop Infrastructure)
- VDI Server Installation
- Profile Roaming