Cyber Security

Cyber Security

Overview

Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks. In a computing context, security comprises cybersecurity and physical security -- both are used by enterprises to protect against unauthorized access to data centers and other computerized systems. Information security, which is designed to maintain the confidentiality, integrity and availability of data, is a subset of cybersecurity.

Cybersecurity refers to the use of network architecture, software, and other technologies to protect organizations and individuals from cyber attacks. The objective of cybersecurity is to prevent or mitigate harm to – or destruction of – computer networks, applications, devices, and data.

LEARNING OUTCOMES

On completion of the course, students will be able to:

  • Good knowledge of Social Media Security.
  • Information Security Management Program.
  • Elements of Information Security.
  • The Security, Functionality, and Usability Triangle.
  • Information Security Threat Categories.
  • Types of Attacks on a System.
  • Comparing Security Audit, Vulnerability Assessment, and Penetration Testing.
  • Why Ethical Hacking is Necessary.
  • Scope and Limitations of Ethical Hacking.
  • Skills of an Ethical Hacker.
  • Introduction to Malware Analysis.
  • Web Server Security Issue.
  • The DSA and Related Signature Schemes.
  • Different Ways a Malware can Get into a System.
  • Good client manage technique.
  • Good knowledge of freelancing or outsourcing marketplace.

Course Highlight

Student will be proficient in the following technologies:

  • Web Application Security.
  • Most Common hacking attacks and its Security.
  • Surface Web & Deep/Dark Web.
  • Use And Miss Uses of Web Platform.
  • Social Media's Effect and loopholes.
  • How to Defend Against Cryptographic Attacks.
  • Public Key Infrastructure (PKI).
  • Secure Sockets Layer (SSL).
  • Transport Layer Security (TLS).
  • Pretty Good Privacy (PGP).
  • Message Digest (One-Way Hash) Functions.
  • NIST Cloud Computing Reference Architecture.
  • Example of a Web Application Vulnerable to SQL Injection: Attack Analysis.
  • Introduction to Malware.
  • Common Techniques Attackers Use to Distribute Malware on the Web.
  • How Attackers Deploy a Trojan.
  • Evading Anti-Virus Techniques.
  • Overview of Network Scanning.
  • Credit Card Fraud and anti-theft.
  • Cyber Forensic and digital forensic.
  • Students will receive language training international client communication.
  • How to good support on cyber security community.
  • How to branding your activity in local market.
  • How to manage local and international client.

Course Requirements/Prerequisites

The Requirements to become a web designer:

  • Basic knowledge of computer operating.
  • Basic knowledge of internet browsing (email/google/facebook).
  • Basic knowledge of English (Reading/Writing/Speaking).

Course Duration

  • Duration: 3 months
  • (2 days a week, 2 hours a day.)

Course Fee

  • BDT- 30000/=

Our Partners