H | CA (Cybersecurity Analyst)
Students enrolled in the Cybersecurity Analyst course will be equipped with the skills necessary to monitor and defend organizational assets from cyber threats in the workplace. In order to maintain the security posture of contemporary companies, this course places a strong emphasis on practical skills in threat detection, incident response, and vulnerability assessment.
Duration : 3 months
Module 1: Introduction to Cybersecurity Tools & Cyberattacks
What is Cyber Security?
Importance of Cyber Security
Cyber Security Domains
CIA Triad
Vulnerability, Threat and Risk
Understand authentication and identity management concepts for safeguarding your organization
Module 2: Operating Systems: Overview, Administration, and Security
Essential OS knowledge for professionals looking to get started in cybersecurity and IT support
Manage Users and Groups
Manage File/Folder Permissions
Command Line
Special Permissions
Disk Management
Service and Process Management
Module 3: Cybersecurity Compliance Framework, Standards & Regulations
Define fundamental concepts of cybersecurity, including governance, risk management, compliance, AI ethics, and the audit process.
Identify cybersecurity laws and regulations, both at a national and international level and comprehend their implications for organizations.
Explore industry standards and their significance in cybersecurity practices and gain insights into the COBIT framework and SOC reports.
Apply cybersecurity industry standards and best practices to mitigate risks, enhance security, and ensure compliance through audit processes.
Security devices and software, Security Standards, Compliances & Protocols.
Understanding of Computer Networks, Network Security and Network Devices. Ability to identify and mitigate network vulnerabilities and explain how to avoid them.
Experience with computer network penetration testing and techniques.
Understanding of firewalls, proxies, SIEM, antivirus and IDPS concepts
Module 4: Threat Management
Reconnaissance techniques using appropriate tools and processes.
Analyze the results of a network reconnaissance
Network-based threat, implement or recommend the appropriate response and countermeasure.
Monitor network traffic, System logs and security alerts to detect
Analyze potential security threats, such as malware, intrusions, and unauthorized access
Module 5: Vulnerability Management and Assessment
Implement an information security vulnerability management process.
Analyze the output resulting from a vulnerability scan.
Compare and contrast common vulnerabilities found in the following targets within an organization.
Identify vulnerabilities in software, hardware and Network Configurations
Patches and Security Updates
Module 6 : Cyber Incident Response
Implement an information security vulnerability management process.
Analyze the output resulting from a vulnerability scan.
Develop and execute incident response plans to address and mitigate security incidents
Prepare a toolkit and use appropriate forensics tools during an investigation.
Analyze common symptoms to select the best course of action to support incident response.
Summarize the incident recovery and post-incident response process.
Module 7 : Security Architecture and Tool Sets
Explain the relationship between frameworks, common policies, controls, and procedures.
Use data to recommend remediation of security issues related to identity and access management.
Review security architecture and make recommendations to implement compensating controls.
Use application security best practices while participating in the Software Development Life Cycle (SDLC).
Module 8 : Security Monitoring and Access Control
Continuously monitor and analyze security events
Vulnerabilities, and recommend security enhancements
Security Policies and Procedures: Develop and enforce security policies, standards, and procedures to ensure a consistent and secure computing environment
Access Control: Implement and manage access control systems, including user authentication, authorization, and password policies
Module 9 : Security Tools
Utilize a range of security tools such as Intrusion Detection Systems (IDS)
Intrusion prevention systems (IPS), firewalls, antivirus software, and data encryption
Links
Contact Info
- +91 9920955055
- contact@hackanics.com
- Mumbai , Pune , Bangalore, Udaipur , Jaipur
Sign up for Newsletter
Hackanics copyright © 2024. All Rights Reserved.