Module1: Network Attacks and defense Strategies
- This module introduces you to different network based attacks that organizations face to understand their working and develop defense strategies
Module 2: Administrative Network security
- It involves developing and updating security infrastructure and continually monitoring networks for any suspicious actions or unauthorized access
Module 3: Technical Network Security
- Implementing authentication and protection controls for user verification to avoid theft of sensitive information or data. Introducing the concept of zero trust and its effectiveness in maintaining a better security posture
Module 4: Network Perimeter Security
- Implementation and management of perimeter devices like firewalls, intrusion detection systems, and intrusion prevention systems
Module 5: Endpoint Security-windows Systems
- Security of end-user devices and entry points by implying endpoint security on Windows
Module 6: Endpoint Security-Linux Systems
- Securing entry points or end-user devices by ensuring endpoint security on Linux devices
Module 7: Endpoint Security-Mobile Devices
- Securing entry points or end-user devices by ensuring endpoint security on mobile devices
Module 8: Endpoint Security-IoT Devices
- Fundamentals of IoT, IoT threats and security using endpoint security implementations
Module 9: Administrative Application Security
- Understanding the methodologies of administrative application security and its importance to minimize the security-related vulnerabilities in the application
Module 10: Data Security
- Implementing policies to safeguard data from unauthorized access using various techniques like encryption, hashing, tokenization, and other key management practices. Concept of data storage, data classification and masking, retention, and destruction
Module 11: Enterprise Virtual Network Security
- In-depth understanding of virtualization, related threats, and security. Essentials of software-defined networks (SDN) security, network function virtualization (NFV) security
Module 12: Enterprise Cloud Network Security
- Introduction tom cloud computing, threats, challenges and security across cloud platforms, concepts of container security, docker security and kubernetes security
Module 13: Enterprise Wireless Network Security
- Understanding of wireless network security essentials, threats, and attacks
Module 14: Network Traffic monitoring and Analysis
- Analysis and monitoring of logs from various perimeter network devices to identify any anomalies
Module 15: Network Logs Monitoring and Analysis
- Analyzing the events generated by various devices in the network to identify signs of any suspicious activity or a potential incident
Module 16: Incident Response and Forensic Investigations
- Understanding of incident management response process and methodologies to be followed in the case of security incidents. Understanding of forensic investigation techniques and tools used for analysis
Module 17: Business Continuity and Disaster Recovery
- Understanding the importance of BCP and DR, related concepts and procedures required to allow smooth functioning of operations in case of a disaster
Module 18: Risk Anticipation with Risk Management
- Risk management process, analyzing various risks that the organization is susceptible to and developing policies to manage them
Module 19: Threat Assessment with Attack Surface Analysis
- Analyzing the threats and attack vectors to develop solutions for their countermeasures
Module 20: Threat Prediction with Cyber Threat Intelligence
- Developing a proactive approach by understanding various frameworks aiding in threat intelligence to anticipate the kinds of attacks hackers could use to gain access to the network