

Certification in Cyber Security Primer (CSPC)
IT & Software (IT & Software)
Shortlisted by 68+ Students
Location: Bengaluru/Bangalore
Duration: 1 MONTH
Regular / Offline
Average Fees: ₹ 20000
Highlights The Cyber Security Primer Certification (CSPC) certification program is an entry-level certification by AVIGDOR that validates your knowledge of cybersecurity concepts. It's a good starting point for those looking to begin a career in IT security. It is designed to validate work-ready skills and knowledge to help you find a job in the field of networking and cybersecurity.The Cyber Security Primer Certification (CSPC) validates a number of entry-level cybersecurity concepts and subjects,including security principles, network security, endpointsecurity, vulnerability assessment, risk management, and incident handling.
Syllabus
MODULE 1: Introduction to Ethical Hacking
Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, Elements Of Information security, Information security threats, Networking Fundamentals
MODULE 2:Ethical Hacking Fundamentals
Hacking and Hacker classes, Types of Ethical Hacking, Tools and Techniques Used in Ethical Hacking, Terminologies and its explanation, Phases of hacking, Understanding Cyber Kill Chain Method, Mitre Attack, and Diamond Model; Tactics, Techniques, and Procedures (TTP)
MODULE 3:Understanding Footprinting
Information Gathering/Footprinting/Reconnaissance, Active and passive reconnaissance, testing (port scanning, automation), Google Dorking
MODULE 4:Security Threats and Vulnerability
Threat and threat sources, Vulnerability identification, management, and mitigation, Vulnerability Assessment, NVD and CVE
MODULE 5:Physical Security
What is Physical Security, Fencing and Bollards, Attacking with Brute force, Surveillance System, Bypassing Surveillance System, Access Control Vestibules, Door Locks and Access Badge Clonning
MODULE 6:Social Engineering
What is Social Engineering and Tactics, Phases of Social Engineering, Social Engineering Techniques, Insider Threat, Identify Theft, Impersonation on Social Engineering sites and tools, Phishing, Social Engineering Counter measures and Understanding Social Engineering Pen Testing
MODULE 7: Malware Threats
Malware, Virus and Worms, Virus and Trojans, Ransomwares, Zombies and Botnets, Rootkits, Backdoors and Logic bombs, Keylogger, Spyware and Bloatware, Malware attack Techniques, Indications of a Malware Attack
MODULE 8:Data Protection
Data Protection, Data Classification, Data Ownership, Data state, Data Types, Data Sovereignty, Securing Data, Data Loss Prevention (DLP), Configuring a DLP
MODULE 9:Risk Management
Risk Management, Risk management Frequency, Risk Identification, Risk Register, Qualitative Risk Analysis, Quantitative Risk Analysis, Risk Management Strategies', Risk Monitoring and Reporting, Disaster recovery and Business continuity planning
MODULE 10:Third-party Vendor Risk
Third Party Vendor Risk, Supply Chain, Supply Chain Attack, Vendor Assessments, Vendor Selection and Monitoring, Contracts and Agreements
MODULE 11:Governance and complaints
Governance and Complaints, Governance and Structure Policies, Data backups, regulatory compliance (PCI DSS, HIPAA, GDPR), BYOD (device management, data encryption, app distribution, configuration management), Standards and Procedures, Governance Considerations Compliances, Non-Compliances Consequences
MODULE 12:Assets and Change management
Asset and Change Management, Acquisitions and Procurment, Mobile Asset Deployments,Asset Management, Asset Disposal and Decommissioning, Change Management, Change
Management Processes, Technical Implication of Changes
MODULE 13:Audits and Assessments
Audits and Assessments, Internal Audit and Assessments, Performing an Internal Assessments, External Audits and Assessments, Performing External Assessments, Penetration Testing
MODULE 14:Cyber Resilience and Redundancy
Cyber Resilience and Redundancy, High Availability, Data Redundancy, Configuring a RAID,Capacity Planning, Powering Data Center, Data Backups, Continuity of Operation plans, Redundancies Site Consideration, Resilience and Recovery Testing
MODULE 15:Security Architecture
Security Architecture, On-Premise versus the Cloud, Cloud Security, Virtualization and containerization, Serverless, Microservices, Network Infrastructure, Software-Defines Network (SDN), Infrastructure as code (IaC), Internet of Things, Embedded Systems
MODULE 16:Security Infrastructure
Security Infrastructure, Ports and Protocols, Firewalls, Configuering Firewalls, IDS and IPS, Network Appliances, Port Security, Securing Network Communication, SD-WAN and SASE, Infrastructure Considerations, Selecting Infrastructure Controls
MODULE 17:Identity and Access Management (IAM) Solutions
Identity and Access Management (IAM) Solutions, Identity and Access Management (IAM), Multifactor Authentication, Password Security, Password Attacks, Single Sign-on Federation, Privileged Access Management (PAM), Access Control Models, Assigning Permissions
MODULE 18:Vulnerabilities and Attacks
Vulnerabilities and Attacks, Hardware Vulnerabilities, Bluetooth Vulnerabilities and attacks,Mobile Vulnerabilities and attack, Zero day Vulnerabilities , Operation System Vulnerabilities , SQL and XML Injections , Conducting SQL injections, Cross site scripting (XSS), Buffer Overflow, Race Condition
MODULE 19:Alerting and Monitoring
Alerting and Monitoring, Monitoring Recourse's, Alerting and Monitoring activities, Simple Network Management Protocols, Security Information and Event Management (SIEM), Data from security tools, Security Content Automation and Protocol, NetFlow and Flow Analysis, Single pane of glass
MODULE 20:Incident Response
Incident Response, Elements of cybersecurity incident response Policy, plan, and procedure elements;, Incident Response Process, Incident response lifecycle stages (NIST Special Publication 800-61 sections 2.3, 3.1-3.4), Threat Hunting, Root cause Analysis, Digital Forensic Procedures, Data Collection Procedures
College Search Made Easy, Find the Right College for You in Minutes, Not Months!
Discover courses, internships, and jobs that sync with your goals.
Get access to premium features and connect directly with experts. You're all set!
Schedule a free online meeting or talk to experts Jump into a meeting with pro-experts. We got you!
Your time is valuable, and we appreciate every moment you spend with us. That's why we continue to reward you for your engagement.