Chritmas and Newyear

SECURITY

Teacher
Franklyn parbhu
Category
Regular
Duration Time
5 days

ABOUT THE COURSE

Computer security is security applied to computing devices such as computers and smartphones, as well as computer networks such as private and public networks, including the whole Internet. The field includes all the processes and mechanisms by which digital equipment, information and services are protected from unintended or unauthorized access, change or destruction, and is of growing importance due to the increasing reliance of computer systems in most societies.It includes physical security to prevent theft of equipment and information security to protect the data on that equipment.

It is sometimes referred to as "cyber security" or "IT security". Those terms generally do not refer to physical security, but a common belief among computer security experts is that a physical security breach is one of the worst kinds of security breaches as it generally allows full access to both data and equipment.



Cybersecurity is the process of applying security measures to ensure confidentiality, integrity, and availability of data. Cybersecurity attempts to assure the protection of assets, which includes data, desktops, servers, buildings, and most importantly, humans. The goal of cybersecurity is to protect data both in transit and at rest. Countermeasures can be put in place in order to increase the security of data. Some of these measures include, but are not limited to, access control, awareness training, audit and accountability, risk assessment, penetration testing, vulnerability management, and security assessment and authorization.

Key Features


20 hours of high quality eLearning content
What You Will Learn
Achievements in work
72 end of chapter quizzes
CD's
Participation Certificate

Who Should Att end


Security Professionals
Security Officers
Security Auditors
Network/System Administrators
Anyone who is concerned about the integrity of the network infrastructure

topics covered


IT professional

Module 01: Basics
Module 02: Control Hijacking Attacks:Exploits and Defenses
Module 03: Dealing with Legency code:Sandboxing and Isolation
Module 04: tools for Writing Robust Application code
Module 05: Principle of Least Privilege,Access control,and Operating Systems Security
Module 06: Exploitation Techniques and Fuzzing
Module 07: Web Security
Module 08: Basic Web Security Model
Module 09: Web Application Security
Module 10: Content Security Policies(CSP),Web Workers,and Extensions
Module 11: Session Management and User Authentication
Module 12: Overview of Crytography
Module 13: HTTPS:Goals and Pitfalls
Module 14: Network Security
Module 15: Security Issues in Internet Protocols:TCP,DNS, and Routing
Module 16: Network Defense Tools:Firewalls,VPNs,Intrusion Detection, and Filters
Module 17: Unwanted Traffics:Denial of Service Attacks
Module 18: Security of Mobile Platforms
Module 19: Mobile Platforms Security Models:Android and iOS
Module 20: Mobile Threats and Malware
Module 21: More on Malware:Viruses,Spyware and Key-Loggers