SECURITY
ABOUT THE COURSE
Computer security is security applied to computing devices such as computers and smartphones, as well as computer networks such as private and public networks, including the whole Internet. The field includes all the processes and mechanisms by which digital equipment, information and services are protected from unintended or unauthorized access, change or destruction, and is of growing importance due to the increasing reliance of computer systems in most societies.
Cybersecurity is the process of applying security measures to ensure confidentiality, integrity, and availability of data. Cybersecurity attempts to assure the protection of assets, which includes data, desktops, servers, buildings, and most importantly, humans. The goal of cybersecurity is to protect data both in transit and at rest. Countermeasures can be put in place in order to increase the security of data.
Key Features
Who Should Attend
| |
Module 01: | Basics |
Module 02: | Control Hijacking Attacks:Exploits and Defenses |
Module 03: | Dealing with Legency code:Sandboxing and Isolation |
Module 04: | Tools for Writing Robust Application code |
Module 05: | Principle of Least Privilege,Access control,and Operating Systems Security |
Module 06: | Exploitation Techniques and Fuzzing |
Module 07: | Web Security |
Module 08: | Basic Web Security Model |
Module 09: | Web Application Security |
Module 10: | Content Security Policies(CSP),Web Workers,and Extensions |
Module 11: | Session Management and User Authentication |
Module 12: | Overview of Crytography |
Module 13: | HTTPS:Goals and Pitfalls |
Module 14: | Network Security |
Module 15: | Security Issues in Internet Protocols:TCP,DNS, and Routing |
Module 16: | Network Defense Tools:Firewalls,VPNs,Intrusion Detection, and Filters |
Module 17: | Unwanted Traffics:Denial of Service Attacks |
Module 18: | Security of Mobile Platforms |
Module 19: | Mobile Platforms Security Models:Android and iOS |
Module 20: | Mobile Threats and Malware |
Module 21: | More on Malware:Viruses,Spyware and Key-Loggers |