Tutelr Infosec Private Limited
Certification in Introduction to Cyber Security
IT & Software (Computer Science & IT)
Shortlisted by 129+ Students
Location: Chennai
Duration: 30 DAYS
Regular / Offline
Average Fees: ₹ 25000
Highlights TISF: Introduction to Cyber Security training course is for you. Students with a basic knowledge of computers and technology but no prior cybersecurity experience can jump-start their security education with insight and instruction from real-world security experts in TISF.This completely revised and comprehensive five-day course covers a wide range of baseline topics, including terminology, the basics of computer networks, security policies, incident response, passwords, and even an introduction to cryptographic principles. The hands-on, step-by-step learning format will enable you to grasp all the information presented even if some of the topics are new to you. You’ll learn fundamentals of cybersecurity that will serve as the foundation of your security skills and knowledge for years to come.
Syllabus
Module Description
SECTION 1: Security’s Foundation
Every good security practitioner and every good security program begins with the same mantra: learn the fundamentals. TISF starts by instilling familiarity with core security terms and principles. By the time you leave the classroom after the first section, you will fully understand the Principle of Least Privilege and Confidentiality, Integrity, Availability (CIA), and you’ll see why those principles drive all security discussions. You will be conversant in the fundamentals of risk management, security policy, and authentication/ authorization/accountability
SECTION 2: Computer Functions and Networking
This course section begins with an explanation of how computers handle numbers using decimal, binary, and hexadecimal numbering systems. It also provides an understanding of how computers encode letters using the American Standard Code for Information Interchange (ASCII). We then spend the remainder of the section on networking.
SECTION 3: An Introduction to Cryptography
Cryptography is one of the most complex issues faced by security practitioners. It is not a topic you can explain in passing, so we will spend some time on it. Not to worry, we won’t take you through the math behind cryptography. Instead, we learn basic crypto terminology and processes
SECTION 4 :Cybersecurity Technologies –:Part 1
Our fourth section in the classroom begins our exploration of cybersecurity technologies. We begin with wireless network security (WiFi and Bluetooth), and mobile device security (i.e., cell phones). We follow that with a brief look at some common attacks. We then move into a discussion of malware and anti-malware technologies. We end the section with an examination of several data protection protocols used for email encryption, secure remote access, secure web access, secure file transfer, and Virtual Private Network (VPN) technologies.
SECTION 5 :Cybersecurity Technologies –:Part 2
The final section of our TISF journey continues the discussion of cybersecurity technologies. The section begins by looking at several security technologies, including compartmentalization, firewalls, Intrusion Detection Systems and Intrusion Prevention Systems (IDS/IPS), sniffers, content filters, etc. We then take a good look at browser and web security, and the difficulties of securing the web environment.
How Promilo Works for Students
College Search Made Easy, Find the Right College for You in Minutes, Not Months!
Search your Career Goal
Discover courses, internships, and jobs that sync with your goals.
Register for Free
Get access to premium features and connect directly with experts. You're all set!
Book a Free Meeting
Schedule a free online meeting or talk to experts Jump into a meeting with pro-experts. We got you!
Stack Up Rewards
Your time is valuable, and we appreciate every moment you spend with us. That's why we continue to reward you for your engagement.