Certification in Cyber Security Primer (CSPC) at AVIGDOR CYBER TECH, Bengaluru/Bangalore

AVIGDOR CYBER TECH

Certification in Cyber Security Primer (CSPC)

IT & Software (IT & Software)

Shortlisted by 68+ Students

Location: Bengaluru/Bangalore

Duration: 1 MONTH

Regular / Offline

Average Fees: ₹ 20000

Highlights The Cyber Security Primer Certification (CSPC) certification program is an entry-level certification by AVIGDOR that validates your knowledge of cybersecurity concepts. It's a good starting point for those looking to begin a career in IT security. It is designed to validate work-ready skills and knowledge to help you find a job in the field of networking and cybersecurity.The Cyber Security Primer Certification (CSPC) validates a number of entry-level cybersecurity concepts and subjects,including security principles, network security, endpointsecurity, vulnerability assessment, risk management, and incident handling.

Similar IT & Software Colleges Across India

Master of Computer Applications (MCA) at Silver Oak University, Ahmedabad

Silver Oak University

IT & Software (MCA)
Ahmedabad
Master of Computer Applications (MCA)
Total Average Fees 1.64 L
Course Duration 2 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, Bachelor of Computer Applications (BCA) at Silver Oak University, Ahmedabad

Silver Oak University

IT & Software (BCA)
Ahmedabad
Bachelor of Computer Applications (BCA)
Total Average Fees 2.70 L
Course Duration 3 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, BCA at Pioneer Degree College, Hyderabad

Pioneer Degree College

IT & Software (BCA)
Hyderabad
BCA
Total Average Fees 14900
Course Duration 3 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, BCA at Siddhartha Degree College for Women, Hyderabad

Siddhartha Degree College for Women

IT & Software (BCA)
Hyderabad
BCA
Total Average Fees 81000
Course Duration 3 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, BCA at Siddartha Degree College, Hyderabad

Siddartha Degree College

IT & Software (BCA)
Hyderabad
BCA
Total Average Fees 75000
Course Duration 3 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, BCA at Annie Besant Women's College, Hyderabad

Annie Besant Women's College

IT & Software (BCA)
Hyderabad
BCA
Total Average Fees 1.50 L
Course Duration 3 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, BCA at Amity University, Hyderabad, Hyderabad

Amity University, Hyderabad

IT & Software (BCA)
Hyderabad
BCA
Total Average Fees 5.94 L
Course Duration 3 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, BCA at David Memorial Business School, Hyderabad

David Memorial Business School

IT & Software (BCA)
Hyderabad
BCA
Total Average Fees 2.85 L
Course Duration 3 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, BCA at London Management Academy, Hyderabad

London Management Academy

IT & Software (BCA)
Hyderabad
BCA
Total Average Fees 3.85 L
Course Duration 3 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, BCA at Ethames Business School, Hyderabad

Ethames Business School

IT & Software (BCA)
Hyderabad
BCA
Total Average Fees 5.70 L
Course Duration 3 YEAR
Free Expert Guidance Shortlisted by 0+ Students

Additional Courses offered by AVIGDOR CYBER TECH

Certification in Cyber Defence Mastery (SOC) at AVIGDOR CYBER TECH, Bengaluru/Bangalore

AVIGDOR CYBER TECH

IT & Software (IT & Software)
Bengaluru/Bangalore
Certification in Cyber Defence Mastery (SOC)
Total Average Fees 25000
Course Duration 2 MONTH
Free Expert Guidance Shortlisted by 0+ Students
, Certification in Cyber Security Professional (CSP) at AVIGDOR CYBER TECH, Bengaluru/Bangalore

AVIGDOR CYBER TECH

IT & Software (IT & Software)
Bengaluru/Bangalore
Certification in Cyber Security Professional (CSP)
Total Average Fees 45000
Course Duration 3 MONTH
Free Expert Guidance Shortlisted by 0+ Students
, Certification in Cyber Security Elite (CSEC) at AVIGDOR CYBER TECH, Bengaluru/Bangalore

AVIGDOR CYBER TECH

IT & Software (IT & Software)
Bengaluru/Bangalore
Certification in Cyber Security Elite (CSEC)
Total Average Fees 35000
Course Duration 2 MONTH
Free Expert Guidance Shortlisted by 0+ Students

Similar IT & Software Courses in Bengaluru/Bangalore

MCA (Online) at Iqra Educational Consultants, Bengaluru/Bangalore

Iqra Educational Consultants

IT & Software (MCA)
Bengaluru/Bangalore
MCA (Online)
Total Average Fees 1.70 L
Course Duration 2 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, BCA (Online) at Iqra Educational Consultants, Bengaluru/Bangalore

Iqra Educational Consultants

IT & Software (BCA)
Bengaluru/Bangalore
BCA (Online)
Total Average Fees 1.70 L
Course Duration 3 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, Master of Computer Applications (MCA) at Sapthagiri College of Engineering, Bengaluru/Bangalore

Sapthagiri College of Engineering

IT & Software (MCA)
Bengaluru/Bangalore
Master of Computer Applications (MCA)
Total Average Fees 2 L
Course Duration 2 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, Bachelor of Computer Applications (BCA) at St Pauls College, Bengaluru/Bangalore

St Pauls College

IT & Software (BCA)
Bengaluru/Bangalore
Bachelor of Computer Applications (BCA)
Total Average Fees 1.62 L
Course Duration 3 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, Master of Computer Applications (MCA) at T. John Institute of Technology, Bengaluru/Bangalore

T. John Institute of Technology

IT & Software (MCA)
Bengaluru/Bangalore
Master of Computer Applications (MCA)
Total Average Fees 90000
Course Duration 2 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, Bachelor of Computer Applications (BCA) at T. John Institute of Technology, Bengaluru/Bangalore

T. John Institute of Technology

IT & Software (BCA)
Bengaluru/Bangalore
Bachelor of Computer Applications (BCA)
Total Average Fees 1.62 L
Course Duration 3 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, Bachelor of Computer Applications (BCA) at St. Claret College, Bengaluru/Bangalore

St. Claret College

IT & Software (BCA)
Bengaluru/Bangalore
Bachelor of Computer Applications (BCA)
Total Average Fees 3.39 L
Course Duration 3 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, Master of Computer Applications (MCA) at RV Institute of Technology and Management (RVITM), Bengaluru/Bangalore

RV Institute of Technology and Management (RVITM)

IT & Software (MCA)
Bengaluru/Bangalore
Master of Computer Applications (MCA)
Total Average Fees 4 L
Course Duration 2 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, Master of Computer Applications (MCA) at R.N.S. Institute of Technology, Bengaluru/Bangalore

R.N.S. Institute of Technology

IT & Software (MCA)
Bengaluru/Bangalore
Master of Computer Applications (MCA)
Total Average Fees 7 L
Course Duration 2 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, Master of Computer Applications (MCA) at Bangalore Institute of Technology, Bengaluru/Bangalore

Bangalore Institute of Technology

IT & Software (MCA)
Bengaluru/Bangalore
Master of Computer Applications (MCA)
Total Average Fees 1.17 L
Course Duration 2 YEAR
Free Expert Guidance Shortlisted by 0+ Students

Frequently Asked Questions

Syllabus

MODULE 1: Introduction to Ethical Hacking

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, Elements Of Information security, Information security threats, Networking Fundamentals

MODULE 2:Ethical Hacking Fundamentals

Hacking and Hacker classes, Types of Ethical Hacking, Tools and Techniques Used in Ethical Hacking, Terminologies and its explanation, Phases of hacking, Understanding Cyber Kill Chain Method, Mitre Attack, and Diamond Model; Tactics, Techniques, and Procedures (TTP)

MODULE 3:Understanding Footprinting

Information Gathering/Footprinting/Reconnaissance, Active and passive reconnaissance, testing (port scanning, automation), Google Dorking

MODULE 4:Security Threats and Vulnerability

 Threat and threat sources, Vulnerability identification, management, and mitigation, Vulnerability Assessment, NVD and CVE

MODULE 5:Physical Security

 What is Physical Security, Fencing and Bollards, Attacking with Brute force, Surveillance System, Bypassing Surveillance System, Access Control Vestibules, Door Locks and Access Badge Clonning

MODULE 6:Social Engineering

 What is Social Engineering and Tactics, Phases of Social Engineering, Social Engineering Techniques, Insider Threat, Identify Theft, Impersonation on Social Engineering sites and tools, Phishing, Social Engineering Counter measures and Understanding Social Engineering Pen Testing

MODULE 7: Malware Threats 

Malware, Virus and Worms, Virus and Trojans, Ransomwares, Zombies and Botnets, Rootkits, Backdoors and Logic bombs, Keylogger, Spyware and Bloatware, Malware attack Techniques, Indications of a Malware Attack

MODULE 8:Data Protection

Data Protection, Data Classification, Data Ownership, Data state, Data Types, Data Sovereignty, Securing Data, Data Loss Prevention (DLP), Configuring a DLP

MODULE 9:Risk Management

Risk Management, Risk management Frequency, Risk Identification, Risk Register, Qualitative Risk Analysis, Quantitative Risk Analysis, Risk Management Strategies', Risk Monitoring and Reporting, Disaster recovery and Business continuity planning

MODULE 10:Third-party Vendor Risk

Third Party Vendor Risk, Supply Chain, Supply Chain Attack, Vendor Assessments, Vendor Selection and Monitoring, Contracts and Agreements

MODULE 11:Governance and complaints

Governance and Complaints, Governance and Structure Policies, Data backups, regulatory compliance (PCI DSS, HIPAA, GDPR), BYOD (device management, data encryption, app distribution, configuration management), Standards and Procedures, Governance Considerations Compliances, Non-Compliances Consequences

MODULE 12:Assets and Change management

Asset and Change Management, Acquisitions and Procurment, Mobile Asset Deployments,Asset Management, Asset Disposal and Decommissioning, Change Management, Change
Management Processes, Technical Implication of Changes

MODULE 13:Audits and Assessments

Audits and Assessments, Internal Audit and Assessments, Performing an Internal Assessments, External Audits and Assessments, Performing External Assessments, Penetration Testing

MODULE 14:Cyber Resilience and Redundancy

Cyber Resilience and Redundancy, High Availability, Data Redundancy, Configuring a RAID,Capacity Planning, Powering Data Center, Data Backups, Continuity of Operation plans, Redundancies Site Consideration, Resilience and Recovery Testing

MODULE 15:Security Architecture

Security Architecture, On-Premise versus the Cloud, Cloud Security, Virtualization and containerization, Serverless, Microservices, Network Infrastructure, Software-Defines Network (SDN), Infrastructure as code (IaC), Internet of Things, Embedded Systems

MODULE 16:Security Infrastructure

Security Infrastructure, Ports and Protocols, Firewalls, Configuering Firewalls, IDS and IPS, Network Appliances, Port Security, Securing Network Communication, SD-WAN and SASE, Infrastructure Considerations, Selecting Infrastructure Controls

MODULE 17:Identity and Access Management (IAM) Solutions

Identity and Access Management (IAM) Solutions, Identity and Access Management (IAM), Multifactor Authentication, Password Security, Password Attacks, Single Sign-on Federation, Privileged Access Management (PAM), Access Control Models, Assigning Permissions

MODULE 18:Vulnerabilities and Attacks

Vulnerabilities and Attacks, Hardware Vulnerabilities, Bluetooth Vulnerabilities and attacks,Mobile Vulnerabilities and attack, Zero day Vulnerabilities , Operation System  Vulnerabilities , SQL and XML Injections , Conducting SQL injections, Cross site scripting (XSS), Buffer Overflow, Race Condition

MODULE 19:Alerting and Monitoring

Alerting and Monitoring, Monitoring Recourse's, Alerting and Monitoring activities, Simple Network Management Protocols, Security Information and Event Management (SIEM), Data from security tools, Security Content Automation and Protocol, NetFlow and Flow Analysis, Single pane of glass

MODULE 20:Incident Response

Incident Response, Elements of cybersecurity incident response Policy, plan, and procedure elements;, Incident Response Process, Incident response lifecycle stages (NIST Special Publication 800-61 sections 2.3, 3.1-3.4), Threat Hunting, Root cause Analysis, Digital Forensic Procedures, Data Collection Procedures

How Promilo Works for Students

College Search Made Easy, Find the Right College for You in Minutes, Not Months!

Search your Career Goal

Discover courses, internships, and jobs that sync with your goals.

Register for Free

Get access to premium features and connect directly with experts. You're all set!

Book a Free Meeting

Schedule a free online meeting or talk to experts Jump into a meeting with pro-experts. We got you!

Stack Up Rewards

Your time is valuable, and we appreciate every moment you spend with us. That's why we continue to reward you for your engagement.

Connect with us