Technology Course

IT CYBER SECURITY

Course Type: Certification | Study Mode: Full-Time
Keywords: IT CYBER
Course Provider:

Course Detail

Introduction
UN ITS OF STUDY
Lesson 1
Introduction
Audit Process
Auditing Standards
Auditing Guidelines
Cobit Model
Audit Management
Internal Control Classifications
Planning
Program
Evidence
Audit Control Evaluation
C S A Control Self- Assessment
Lesson 2
IT Governance
Outsourcing And Governance
IT Security
Governance And Security Policies
Organizational Compliance
Outsourcing And Globalization
Outsourcing
IT Performance
Lesson 3
System and Infrastructure
Requirements
Project Management Tools- Part1
Project Management Tools- Part2
Applications
Agile Development
Monitoring And Controlling
Acquisition Process
Testing Process
Information Systems Maintenance Practices
Data Conversion Tools CISSP
Module 1
Intro
Least Incorrect Answer
Ethics
Module 2
Accounts And Identity Management
Authentication Services
Categories And Types
Penetration Testing And Auditing
Systems M A C D A C R B A C
Module 3
Telecommunications
Wired Physical Interfaces
Physical Layer
Layer
Wireless
Wireless Lan
Layer34 And Firewalls
Firewalls
Protocols
Transport Layer
Layers5 And6
Presentation Layer
Layer7
Authentication
Printing
Messaging
Security Protocol
Application Attacks
Honeypots
Telecommunications
Voice Over I P
Attacks
VOIP Controls
Module 4
Layers of Protection
Penetration Testing
Vectors of Test
Scope
Technical Penetration Testing
Pen Testing Methodology
Module 5
Application Security
Connectivity Interfaces And Applications
Malware
Attack Types
Malformed Input
Payload
Web Risks
Insecure Direct Object Reference
Security Misconfiguration
How To Pass The Exam
Overview
Risk Management
Patch Management
Levels Of Patch Management
Software Development Life Cycle
Security
Module 6
Cryptography
Symmetric Vs Asymmetric
Managing Key Sizes
Initialization Vector
Asymmetric
Crytology Law
Message Integrity Controls
Apply Integrity Controls
Digital Signature Overview
Types of Encryption
Digital Signatures
Key Agreement
Hierarchical Trust Model
PGP And Digital Signatures
Spam Vs PKI
Cryptography and Stenography
Investigating For Steganography
Code Breaking
Common Cryptanalytical Attacks
Types of Attacks
Module 7
Common Criteria And Trusted Computing Base
Frameworks
Hardware
Software OS Design
Module 8
Data Classification
Data Backup and Control
Privilege Entry Control
I D S And IPS
Module 9
Business Continuity Planning
Policy And Program Management
Business Impact Analysis Business Impact Analysis
Strategy Options
Incident Management Plans
Activity Response Plans
Test Plan
Embedding Business Continuity Plan
Module 10
Law Domain
Incident Handling
Legal Systems
Strategy Options
Intellectual Property
Module 11
Fire and Power
Perimeter Barrier Lock Sensor Guard
Physical Security Planning
Conclusion
Business Impact Analysis
Strategy Options
Incident Management Plans
Activity Response Plans
Test Plan
Embedding Business Continuity Plan
Module 10
Law Domain
Incident Handling
Legal Systems
Strategy Options
Intellectual Property
Module 11
Fire and Power
Perimeter Barrier Lock Sensor Guard
Physical Security Planning
Conclusion
Keyword(s)