Cyber Security Specialist
MODULE 1: Security Essentials
MODULE 2: Cryptography
MODULE 3: Computer Networks & Security
MODULE 4: Application Security
MODULE 5: Data & Endpoint Security
MODULE 6: IdAM (Identity & Access Management)
MODULE 7: Cloud Security
MODULE 8: Phases of a Cyber Attack
MODULE 9: Security Processes in practice for Businesses
Top

Cyber Security Specialist

Free
Categories:
cyber-security

About this course

UET’s Cybersecurity Certification Course will help you in establishing a strong foundation towards your journey in the Cybersecurity domain. As part of this Cybersecurity course, you will be learning about the various fundamental concepts about Security essentials, Cryptography, Network Security, Application Security, Data & Endpoint Security, Cloud Security, Cyber Attacks and Identity & Access Management.

Prerequisites: No Programming background required but Technical background education is required
Key Topics to Cover : Data security,computer networks ,IDAM
Intended Outcomes:Exposure To Cybersecurity and cryptographic techniques

PROJECTS:

Which case studies will be part of this course?

Case Study 1:
Data Encryption: – Encrypt and decrypt a file using Advanced Encryption Package

Case Study 2:
Intrusion Detection System (IDS): – Install and configure a network intrusion detection system using SAX2 IDS

Case Study 3:
Personal Firewall: – Protect the system by installing and configuring the Zone Alarm Firewall

Case Study 4:
Password Changing: – Changing Windows password when it is Changer.
Case Study 5:
Network Scanning: – Monitoring and study network traffic using Wireshark.

Syllabus

UET’s Cybersecurity Certification Course will help you in establishing a strong foundation towards your journey in the Cybersecurity domain. As part of this Cybersecurity course, you will be learning about the various fundamental concepts about Security essentials

MODULE 1: Security Essentials

MODULE 2: Cryptography

MODULE 3: Computer Networks & Security

MODULE 4: Application Security

MODULE 5: Data & Endpoint Security

MODULE 6: IdAM (Identity & Access Management)

MODULE 7: Cloud Security

MODULE 8: Phases of a Cyber Attack

MODULE 9: Security Processes in practice for Businesses