The purpose of this course is to equip one with the technologies involved in Cyber Security. The knowledge of these technologies helps in building an appreciation of possible threats, taking preventive measures and taking corrective actions when need be.
Course Coverage
A. Basic Concepts
B. Cryptography, Cryptographic Protocols & IPSec
C. OS Security - Access Control, Rootkit
D. Hacking (Ethical & Malicious)
E. DDOS & Ransomware
F. HTTP - DNS Filtering
G. Malware & Worms
H. Firewalls
I. Intrusion Detection & Prevention
J. OWASP10
K. Vulnerability Testing
L. API Security
M. SQL Injection & Cross site scripting
N. Incident Response Plan & Attack planning
O. Tools & Methods
Follow us on Facebook :
https://www.facebook.com/3srconsultants
https://www.facebook.com/careernourishers
Follow us on Instagram :
https://www.instagram.com/careernourishers3src
For more information contact us :
+91 7701965793, +91 9810767563
Email us :
[email protected]
Visit our website :
www.careernourishers.com
www.3srconsultancy.com
Course Coverage
A. Basic Concepts
B. Cryptography, Cryptographic Protocols & IPSec
C. OS Security - Access Control, Rootkit
D. Hacking (Ethical & Malicious)
E. DDOS & Ransomware
F. HTTP - DNS Filtering
G. Malware & Worms
H. Firewalls
I. Intrusion Detection & Prevention
J. OWASP10
K. Vulnerability Testing
L. API Security
M. SQL Injection & Cross site scripting
N. Incident Response Plan & Attack planning
O. Tools & Methods
Follow us on Facebook :
https://www.facebook.com/3srconsultants
https://www.facebook.com/careernourishers
Follow us on Instagram :
https://www.instagram.com/careernourishers3src
For more information contact us :
+91 7701965793, +91 9810767563
Email us :
[email protected]
Visit our website :
www.careernourishers.com
www.3srconsultancy.com
- Category
- Security
- Tags
- #Carrernourishers, #Education, #Certification, AVA 360 security
Sign in or sign up to post comments.
Be the first to comment