Cyber Security
3.5
This cyber security training program, you will learn to approach cyber security offensively and defensively through real-world examples and exercises, hands-on labs and expert instruction. You will gain knowledge to close skill set gaps, meet and maintain mandates and sustain and retain a highly-qualified workforce to secure your critical systems and assets.
NEXT BATCH STARTS ON
Start Date | Class Days | Class Time |
---|---|---|
Jan 21, 2025 | Tuesday,Thursday | 08:30pm - 10:30pm |
Start Learning
Get all the information about the course and pricing
Call: 571-645–5899
Email: info@agile1tech.com
Our cybersecurity program provides a comprehensive curriculum tailored to equip professionals with essential skills to safeguard organizations against cyber threats. Participants gain hands-on experience in implementing cutting-edge methodologies, up-to-date certification preparation, specialized courses, and practical simulations for real-world readiness. All training is aligned with industry standards, ensuring the highest quality education.
Prerequisite: Basic Computer Skills, Networking Fundamentals and Programming Basics
Training Duration: 2 months.
Classes per week: 2 Classes.
Class Duration: 2 hours.
Class Mode: Online.
Course details and curriculum:
- Difference Between Information Security and Cyber Security
- The Trinity of IT Security – CIA
- Basic Terminologies and Computer Protocols
- Cookies and The TCP/IP
- What is NOT Hacking
- Types of Hackers and Hacking Methodology
- The WhoIS Query and Social Engineering
- Reconnaissance Methods and Anatomy of an Attack
- Brute Force Attacks and Phishing
- Bots, Botnets, DoS, and DDoS
- Man-in-the-Middle Attacks and SQL Injections
- Introduction to Malware and Types of Malware
- Antivirus and Trojans
- Adware, Spyware, and Ransomware
- Encryption and Firewalls
- Biometrics and Multi-Factor Authentication
- Honey Pots and DMZs
- Security for Wireless Networks and Password Management
- BYOD and Mobile Device Management
- Dealing with Disgruntled Employees and the Weakest Link
- Introduction to Cyber Warfare
- The Attack Against Estonia and Stuxnet
- The Sony Hack and Privacy Concepts
- Identity Strategies and Online Tracking
- Introduction to Tor and VPNs
- Accessing the Dark Web with Tor
- How to Disappear Online and Stylometry
- Disk Encryption and Cloud Backup
- Email Basics, Protocols & Ports
- Tracking and Detecting Email Tracking
- Guerrilla Mail and Proton Email
- Encrypting with Veracrypt and Bitlocker
- Encrypting Mac OS with FileVault and Self-Encrypting Drives
- Attacks Against Encryption
- Patching and Updates
- Windows 10 Privacy Settings
- Hardening Windows 10 Firewall and Smart Screen Filter
- Randomizing MAC Address for Privacy