Curriculum
- 8 Sections
- 56 Lessons
- 12 Weeks
Expand all sectionsCollapse all sections
- Module 1: Information/Cyber Security Concepts and Cryptography11
- 1.1Basics of Information Security
- 1.2Security threats, Vulnerabilities
- 1.3Vulnerabilities Management
- 1.4Organizations of Information Security with in organization
- 1.5Ransomware
- 1.6Cryptography
- 1.7Digital Signature: Technical Issues and legal Issues
- 1.8Classical Encryption Techniques
- 1.9Identity and Access Management
- 1.10Security Tools and Technologies
- 1.11E-mail Security
- Module 2: Web Applications Security & Database Security11
- 2.1Web Application Technologies
- 2.2Client-side Exploit Frame Work
- 2.3Bypassing Client-side Controls
- 2.4Web Based Malware
- 2.5Securing Authentication
- 2.6Securing Session Management
- 2.7Securing Access Controls
- 2.8Securing Application Architecture
- 2.9Web Server and Web Application Testing
- 2.10Securing Web Based Services
- 2.11Database Security
- Module 3: Network Security8
- Module 4: Security Incident Response Management9
- 4.1Incident Monitoring and Handling
- 4.2Security Incident and Event Monitoring
- 4.3Investigation and Root Cause Analysis
- 4.4Emergency Response Planning
- 4.5Policy and Procedure development
- 4.6Response Team Planning and Coordination
- 4.7Electronic Discovery
- 4.8Forensic Analysis
- 4.9Evidence Handling and Litigation Support
- Module 5: Security Standards & Information/Cyber Security Policies and Procedures4
- Module 6: Cyber Law & IPR Issues5
- Module 7: Data Privacy4
- Module 8: Security Governance, Risk Management and Governance4