Certification in Cyber Security Professional (CSP) Syllabus at Avigdor Cyber Tech, Bangalore

Certification in Cyber Security Professional (CSP) at AVIGDOR CYBER TECH, Bengaluru/Bangalore

AVIGDOR CYBER TECH

Certification in Cyber Security Professional (CSP)

IT & Software (IT & Software)

Shortlisted by 51+ Students

Location: Bengaluru/Bangalore

Duration: 3 MONTH

Regular / Offline

Average Fees: ₹ 45000

Highlights A Cyber Security Professional course (CSP)course (CSP) is a structured educational program designed to equip individuals with the knowledge, skills, and competencies needed to succeed in the field of cybersecurity. These courses cover a wide range of topics related to cybersecurity, including threat detection and analysis, security architecture, SOC, risk management, incident response, and ethical hacking, among others.

Similar IT & Software Colleges Across India

BCA + MCA (Integrated) at GNIOT Group of Institutions, Delhi/NCR

GNIOT Group of Institutions

IT & Software (BCA)
Delhi/NCR
BCA + MCA (Integrated)
Total Average Fees 4.80 L
Course Duration 5 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, Master of Computer Applications (MCA) at GNIOT Group of Institutions, Delhi/NCR

GNIOT Group of Institutions

IT & Software (MCA)
Delhi/NCR
Master of Computer Applications (MCA)
Total Average Fees 2.50 L
Course Duration 2 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, Bachelor of Computer Applications (BCA) at GNIOT Group of Institutions, Delhi/NCR

GNIOT Group of Institutions

IT & Software (BCA)
Delhi/NCR
Bachelor of Computer Applications (BCA)
Total Average Fees 3.14 L
Course Duration 3 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, Bachelor Of Computer Application (BCA) at Maharani Lakshmi Ammanni College for Women, Autonomous (mLAC), Bengaluru/Bangalore

Maharani Lakshmi Ammanni College for Women, Autonomous (mLAC)

IT & Software (BCA)
Bengaluru/Bangalore
Bachelor Of Computer Application (BCA)
Total Average Fees 2.46 L
Course Duration 3 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, Master of Computer Applications (MCA) at Noble Post Graduate College, Hyderabad

Noble Post Graduate College

IT & Software (MCA)
Hyderabad
Master of Computer Applications (MCA)
Total Average Fees 4 L
Course Duration 1 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, Master of Computer Applications (MCA) at St. Claret College (Autonomous), Bengaluru/Bangalore

St. Claret College (Autonomous)

IT & Software (MCA)
Bengaluru/Bangalore
Master of Computer Applications (MCA)
Total Average Fees 3.03 L
Course Duration 2 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, BCA in Cyber Security at St. Claret College (Autonomous), Bengaluru/Bangalore

St. Claret College (Autonomous)

IT & Software (BCA)
Bengaluru/Bangalore
BCA in Cyber Security
Total Average Fees 4.17 L
Course Duration 3 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, BCA in Data Science at St. Claret College (Autonomous), Bengaluru/Bangalore

St. Claret College (Autonomous)

IT & Software (BCA)
Bengaluru/Bangalore
BCA in Data Science
Total Average Fees 4.17 L
Course Duration 3 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, BCA in Artificial Intelligence & Machine Learning at St. Claret College (Autonomous), Bengaluru/Bangalore

St. Claret College (Autonomous)

IT & Software (BCA)
Bengaluru/Bangalore
BCA in Artificial Intelligence & Machine Learning
Total Average Fees 4.17 L
Course Duration 3 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, Bachelor of Computer Applications (BCA) at St. Claret College, Bengaluru/Bangalore

St. Claret College

IT & Software (BCA)
Bengaluru/Bangalore
Bachelor of Computer Applications (BCA)
Total Average Fees 3.84 L
Course Duration 3 YEAR
Free Expert Guidance Shortlisted by 0+ Students

Additional Courses offered by AVIGDOR CYBER TECH

Certification in Cyber Defence Mastery (SOC) at AVIGDOR CYBER TECH, Bengaluru/Bangalore

AVIGDOR CYBER TECH

IT & Software (IT & Software)
Bengaluru/Bangalore
Certification in Cyber Defence Mastery (SOC)
Total Average Fees 25000
Course Duration 2 MONTH
Free Expert Guidance Shortlisted by 0+ Students
, Certification in Cyber Security Elite (CSEC) at AVIGDOR CYBER TECH, Bengaluru/Bangalore

AVIGDOR CYBER TECH

IT & Software (IT & Software)
Bengaluru/Bangalore
Certification in Cyber Security Elite (CSEC)
Total Average Fees 35000
Course Duration 2 MONTH
Free Expert Guidance Shortlisted by 0+ Students
, Certification in Cyber Security Primer (CSPC) at AVIGDOR CYBER TECH, Bengaluru/Bangalore

AVIGDOR CYBER TECH

IT & Software (IT & Software)
Bengaluru/Bangalore
Certification in Cyber Security Primer (CSPC)
Total Average Fees 20000
Course Duration 1 MONTH
Free Expert Guidance Shortlisted by 0+ Students

Similar IT & Software Courses in Bengaluru/Bangalore

Bachelor Of Computer Application (BCA) at Maharani Lakshmi Ammanni College for Women, Autonomous (mLAC), Bengaluru/Bangalore

Maharani Lakshmi Ammanni College for Women, Autonomous (mLAC)

IT & Software (BCA)
Bengaluru/Bangalore
Bachelor Of Computer Application (BCA)
Total Average Fees 2.46 L
Course Duration 3 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, Master of Computer Applications (MCA) at St. Claret College (Autonomous), Bengaluru/Bangalore

St. Claret College (Autonomous)

IT & Software (MCA)
Bengaluru/Bangalore
Master of Computer Applications (MCA)
Total Average Fees 3.03 L
Course Duration 2 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, BCA in Cyber Security at St. Claret College (Autonomous), Bengaluru/Bangalore

St. Claret College (Autonomous)

IT & Software (BCA)
Bengaluru/Bangalore
BCA in Cyber Security
Total Average Fees 4.17 L
Course Duration 3 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, BCA in Data Science at St. Claret College (Autonomous), Bengaluru/Bangalore

St. Claret College (Autonomous)

IT & Software (BCA)
Bengaluru/Bangalore
BCA in Data Science
Total Average Fees 4.17 L
Course Duration 3 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, BCA in Artificial Intelligence & Machine Learning at St. Claret College (Autonomous), Bengaluru/Bangalore

St. Claret College (Autonomous)

IT & Software (BCA)
Bengaluru/Bangalore
BCA in Artificial Intelligence & Machine Learning
Total Average Fees 4.17 L
Course Duration 3 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, Bachelor of Computer Applications (BCA) at St. Claret College, Bengaluru/Bangalore

St. Claret College

IT & Software (BCA)
Bengaluru/Bangalore
Bachelor of Computer Applications (BCA)
Total Average Fees 3.84 L
Course Duration 3 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, Bachelor of Computer Applications (BCA) at Shridevi Group of Educational Institutions, Bengaluru/Bangalore

Shridevi Group of Educational Institutions

IT & Software (BCA)
Bengaluru/Bangalore
Bachelor of Computer Applications (BCA)
Total Average Fees 1.80 L
Course Duration 3 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, Master in Computer Applications (MCA) at Shridevi Group of Educational Institutions, Bengaluru/Bangalore

Shridevi Group of Educational Institutions

IT & Software (MCA)
Bengaluru/Bangalore
Master in Computer Applications (MCA)
Total Average Fees 1.40 L
Course Duration 2 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, MCA  (Add - On) at Koshys Group of Institutions, Bengaluru/Bangalore

Koshys Group of Institutions

IT & Software (MCA)
Bengaluru/Bangalore
MCA (Add - On)
Total Average Fees 4.50 L
Course Duration 2 YEAR
Free Expert Guidance Shortlisted by 0+ Students
, MCA (General) at Koshys Group of Institutions, Bengaluru/Bangalore

Koshys Group of Institutions

IT & Software (MCA)
Bengaluru/Bangalore
MCA (General)
Total Average Fees 3.75 L
Course Duration 2 YEAR
Free Expert Guidance Shortlisted by 0+ Students

Frequently Asked Questions

Syllabus

This Course curriculum is a Combination of CYBER SECURITY ELITE (CSEC)+CYBER DEFENCE MASTERY(CDM)

CYBER SECURITY ELITE (CSEC) TOPICS 

MODULE 1:Introduction to Ethical Hacking & Cybersecurity

Ethical Hacking Intro Session: How you can be hacked, tools used by hackers, what is ethical about hacking, fundamentals of key issues in the information security world, Qualities of a good hacker, Information security Threats, Elements of Cyber security (CIA Triad), Types of hackers, red team, blue team, phases of pen testing/Phases of hacking, Cyber Kill chain Model.

MODULE 2:Ethical Hacking 

Fundamentals Downloading & Installing Vmware workstation. Understanding Kali Linux, Windows VM, Metasploitable, Hackadamics Etc

MODULE 3:Networking Basics 

Basics of Networking Goals of Network Security Network Flow Networking Devices Classification of Network Topology Hardware Internet Devices, IPv4 and IPv6 addresses, MAC addresses, network segmentation, NAT, public vs. private networks DMZ, virtualization, cloud, honeypot, proxy server, IDS, IPS

MODULE 4:Information Gathering Part -1 

 Footprinting and reconnaissance Intro: Gathering Info, Whois, Netcraft, Footprinting on Social Media, Finding & Footprinting People, Footprinting Financial Info, Footprinting Job Sites, Website Mirroring, Archived Websites, Google ducking, Advanced google search, Advanced Image Search, Reverse Image search.

MODULE 5:Information Gathering Part -2

 VM Lab setup. Tracking Emails, Finding IP Address of sender, Fake Email Id (Email Fuzzing), Have I been Pawned, Temporary Emails, Google My Activity, Google Dorks Default Passwords + GHDB

MODULE 6:Network Assessment & Active Network Scanning 

Networking Assessment. Active Scanning:proxy + vpn + TOR Gzapper + Browser + macchanger + Smac + Using nmap

MODULE 7:Vulnerability Assessment & Risk Management

 Nmap, IP scanner. Vulnerability identification, management, and mitigation, Types of VA, Vulnerability Management Life Cycle, OWSAP Top 10, NVD, CVE, CVSS, Qualys Freescan. Vulnerability vs. risk, ranking risks, approaches to risk management, levels of risk (low, medium, high, extremely high), Natural and human-caused disasters, features of disaster recovery plans (DRP) and business continuity plans (BCP), backup, disaster recovery controls (detective, preventive, and corrective)

MODULE 8:System Hacking

Steganography types, Snow, Hashes, password Cracking Techniques, Dictionary Attacks, Brute Force Attacks, Weak and Strong Passwords. Cracking Passwords, Using Metasploit, Hacking into Linux/windows.

MODULE 9:Malware Attacks 

Malware, Virus and Worms, Virus and Trojans, Ransomwares, Zombies and Botnets, Rootkits, Backdoors and Logic bombs, Keylogger, Spyware and Bloatware, Malware attack Techniques, Indications of a Malware Attack. Creating Viruses \Using Currport to detect HTTP RAT.

MODULE 10 :Social Engineering 

Social engineering concepts and techniques, Social Engineering toolkit, Tools(zphisher, camhacker,..etc) tailgating, spear phishing, phishing, vishing, smishing Attacks, Insider Threat, Impersonation on social networking sites, Identity Theft, Social Engineering countermeasure's

MODULE 11:DOS and DDOS, Session Hijacking, Sniffing 

Understanding DOS & DDOS, Using hping3, using DOSHTTP, Using HOIC, LOIC

MODULE 12:OWASP Top 10 Top 10

 Web Application Security Risks, Application security tools and standards, A01:2021-Broken Access Control, A02:2021-Cryptographic Failures, A03:2021-Injection, A04:2021-Insecure Design, A05:2021-Security Misconfiguration, A06:2021-Vulnerable and Outdated Components, A07:2021-Identification and Authentication Failures, A08:2021- Software and Data Integrity Failures, A09:2021-Security Logging and Monitoring Failures, A10:2021-Server-Side Request Forgery

MODULE 13 :Wifi Hacking 

Wireless concept, wireless Encryptions, Wireless hacking methods, Wireless hacking tools, bluetooth hacking, countermeasures

MODULE 14:Hacking Mobile Platforms

Learn Mobile platform attack vector, android and iOS hacking, mobile device management, mobile security guidelines, and security tools.

MODULE 15:Firewalls, IDS & IPS 

Firewall Types of Firewall Application of Firewall Introduction to IDS and IPS Types of IDS Types of IPS Difference Between IDS and IPS

MODULE 16:Application and Web Security

WAF Application of WAF Introduction to Proxy and EDR Application of Proxy and EDR IDAM (Identity and Access Management) Password Protection & Identity Theft Counter Measures and Patch Management

MODULE 17:Cyber Crisis Management and Report writing

 Introduction to Cyber crisis management, Crafting a Robust Cyber Crisis Management Plan, Different approach to write a report

MODULE 18:Governance and complaints

 Governance and Complaints, Governance and Structure Policies, Data backups, regulatory compliance (PCI DSS, HIPAA, GDPR), BYOD (device management, data encryption, app distribution, configuration management), Standards and Procedures, Governance Considerations Compliances, Non-Compliances Consequences

MODULE 19:Identity and Access Management (IAM) Solutions

 Identity and Access Management (IAM) Solutions, Identity and Access Management (IAM), Multifactor Authentication, Password Security, Password Attacks, Single Sign-on Federation, Privileged Access Management (PAM), Access Control Models, Assigning Permissions

MODULE 20:Cryptography

 Cryptography concept's, Hashing, Encoding and Decoding Types of Cryptography, Types of encryption, hashing, certificates, public key infrastructure (PKI); strong vs. weak encryption algorithms; states of data and appropriate encryption (data in transit, data at rest, data in use); protocols that use encryption

MODULE 21:IoT and OT Hacking 

 Learn different types of IoT and OT attacks, hacking methodology, hacking tools, and countermeasures.

MODULE 22:Cloud Computing

 Different cloud computing concepts, such as container technologies and server less computing, various cloud computing threats, attacks, hacking methodology, and cloud security techniques and tools

CYBER DEFENCE MASTERY(CDM) TOPICS 

Module 01: Introduction to Security Operations Center (SOC)

Module 02: Fundamentals of Cybersecurity

Module 03: Network Security Fundamentals

Module 04:TCP/IP protocols and security protocols

Module 05: Information and Event Management (SIEM) Introduction

Module 06: Security Tools and Technologies Overview

Module 07: Log Management and Analysis

Module 08: Event analysis

Module 09 :Types of alert analysis from SIEM too

Module 10 : EDR tools and fundamentals

Module 11: EDR overview

Module 12: MITRE attack framework

Module 13: Vulnerabilities and the top 10 list

Module 14 : Incident response and its steps

Module 15  Incident handling 

Module 16: Cloud basics

Module 17: Cloud Security Fundamentals

Module 18: Security Tools and Technologies Overview

Module 19: Malware analysis

Module 20: Ransomware incident mitigation

Module 21: SOC analyst interview preparation

Module 22 :SOc analyst interview questions

How Promilo Works for Students

College Search Made Easy, Find the Right College for You in Minutes, Not Months!

Search your Career Goal

Discover courses, internships, and jobs that sync with your goals.

Register for Free

Get access to premium features and connect directly with experts. You're all set!

Book a Free Meeting

Schedule a free online meeting or talk to experts Jump into a meeting with pro-experts. We got you!

Stack Up Rewards

Your time is valuable, and we appreciate every moment you spend with us. That's why we continue to reward you for your engagement.

Connect with us