Course Overview
Cybersecurity is important because it protects all categories of data from theft and damage. This includes sensitive data, personally identifiable information (PII), protected health information (PHI), personal information, intellectual property, data, and governmental and industry information systems. This course aims to provide a platform for Cyber Security Aspirants by providing Training on Endpoint Security, Network Security, and Virtualization. The course focuses to cover these topics theoretically and practically. This course provides a range of career opportunities in Cyber Security Sectors such as Network/Application Security Analyst, Cyber Security Analyst, Cyber Security Analyst, Cyber Security Practitioner, Cyber Defense Analyst, and Information Security Engineer.
Course Objectives
The course is designed in a way that a candidate can identify, analyze, and remediate computer security breaches by learning and implementing real-world scenarios.
- To develop an understanding of networking basics, different components of computer networks, various protocols, modern technologies, and their applications.
- Threats related to endpoints and solutions to help defend from all kinds of attacks.
- Exhibit knowledge to secure corrupted systems, protect data, and secure computer networks in an organization.
- Learn and Practice to design and implement security solutions.
- Implement security solutions for endpoints, networks, VPN
Learning Outcomes
- Understand the basics of networking standards and the OSI Model
- Introduction to TCP/IP Protocols, Topologies, Network Hardware, WANs, Remote Networking, Wireless networking
- Analyze and resolve security issues in networks and computer systems to secure IT infrastructure.
- Develop policies and procedures to manage enterprise security risks.
- Install and configure virtualization technology such as VMware.
- Deploy, manage, and migrate virtual machines.
- The learner will be trained for Job roles in cyber security such as Network Security Engineer, Cyber Security Analyst, Security Analyst, Endpoint Security Engineer, Cyber Threat Analyst, Information Security Analyst, IT Security Analyst, Security Systems Administrator
Course Curriculum
Module 1 – Hardware & Networking
- Computer Fundamentals
- Memory and Memory Management
- Motherboard
- Power Supply
- Windows commands
- Networking Basics
- OSI Model
- Network Devices
- TCP/IP Protocols
- Addressing methods and Subnetting
- Important Network terms
Module 2 – Operating System (OS)
- What is OS?
- OS Installation
- Network Management
- Storage and Performance
- OS Configuration
- User Management
- Application Installation
- AD Introduction
- Implementation & Configuration of AD & DNS
- Client Server Configuration
- User Management
- Configuration of Group Policy
- DHCP Server Installation and Configuration
- Install and Configure Mail Client
Module 3 – Availability
- Types of Backups
- Types of Storage
- Storage Technologies
- RAID Technology
- Load Balancer
- Clustering HA
- Archiving
Module 4 – Security Basics
- Introduction to Cybersecurity
- Knowing Threats
- Hardening of system and network to stop threats
- Authentication Models
- Knowing Vulnerability or VAPT
- Security Control Defensive Technologies
- Perimeter Security
- Datacenter Security
- Building security framework and Compliance
- Event Logging and Incident Monitoring & Management
Module 5 – Endpoint Security
- Endpoint Protection
- Threat Detection
- Log Management and Event Co-relation
- Automated Investigation & Response
- Incident Monitoring & Reporting
- Deployment Options (Windows, Linux & MAC)
- Security & IT Operations
- Ideal Setting
- Profile Settings
- Manage Global Users
- Analysis
- Third Party Integration
Module 6 – Network Security
- What is a Firewall?
- Working of Firewall/Packet Flow
- Organization Requirements
- Walkthrough to Firewall Console
- Firewall Core Features
- Basic Configuration
- Firewall Connectivity through different modes
- What is VDOM and its types?
- Firewall Rules Configuration
- Firewall Log Management / Syslog configuration
- Firewall deployment mode and its types
- Firewall backup
- NAT and its types
- Certificate inspection and its types/uses
- LDAP/TACAS Integration with Firewall
- VPN and its types
- Quality of Service, Traffic Shaping
- Security profiles
Module 7 – VPN & Virtualization
- Introduction to VPN
- Types of VPN
- VPN Client Installation
- VPN Server Installation
- SSO Policy
- Virtualization
- VDI (Virtual Desktop Infrastructure)
- VDI Server Installation
- Profile Roaming