Cyber Security Specialist Workshop

This cyber security workshop program is following a top-down approach where candidates will learn important Cyber Security Skills implementation in real business environment. Its well known that an...

  • All levels
  • English

Course Description

This cyber security workshop program is following a top-down approach where candidates will learn important Cyber Security Skills implementation in real business environment. Its well known that any candidates learn much faster while working in real cyber security projects than while taking training or online courses accordingly we are giving our students an opportunity to join real Cyber Secur...

This cyber security workshop program is following a top-down approach where candidates will learn important Cyber Security Skills implementation in real business environment. Its well known that any candidates learn much faster while working in real cyber security projects than while taking training or online courses accordingly we are giving our students an opportunity to join real Cyber Security Projects with guidance on how to execute real project tasks and give our students a chance to learn by experiences. This approach is much more effective than the normal learning path that depend on traditional training or online courses that will provide candidate with the knowledge but miss the real implementation experience.

What you’ll learn
  • Gain Cyber Security realistic experience
  • Pass Cyber Security exams and get certified with the most valuable CS Certificates
  • Get real life implementation experience from real Cyber Security projects
  • Understand the real business challenge
  • Get the confidence you need to apply for any jobs

Covering Topics

1
Introduction

2
Important Information for the Program

3
Team Meeting and Assignments

4
Basic Cyber Security Foundation

5
Build a Testing Lab

6
Information Asset Management

7
Risk Management

8
Incident & Problem Management

9
Access Control

10
Network Management

11
Business Continuity Planning

12
IS Acquisition, Development

13
Environmental & Physical Sec

14
Compliance

15
IS Assurance & Performance

16
Cyber Security Real Projects

17
IS Management & Governance

Curriculum

      Introduction --  Workshop on Cyber Security (17:39)  Program Syllabus  Introduction (2:40)  Student Portal (1:47)
      Important Information for the Program  1. Before we  the program (3:24)  2.Organizational Chart (3:38)  3.Job Description (8:54)  4. SkillSet Matrix (1:56)
      Team Meeting and Assignments  First Meeting - Project 1 Kick off (111:59)  Assignment 1  Security Incident - Shared Folder Deleted (12:56)  Second Meeting - IS Policy & IAM (98:51)  Third Meeting - IS Audit Sample / Access Control / Technical Setting (87:57)  Fourth Meeting - Setup Your Virtual Lab (93:50)  Fifth Meeting - Access Control (105:49)  Security Incident 2 (2:53)  6th meeting: Milestone 1- Risk Assessment (126:39)  Risk Assessment - Part 2 (25:47)  New Incident _ Due Diligence / Due Care (12:23)  Operation Security AV-Backup (101:07)  Use Case - Technical Control - Baselines (117:36)  Cryptography (106:35)  Nessus Installation (6:49)  Vulnerability Assessments - DLP Project (102:55)  DLP Project, PCI-DSS, Network Support (128:57)  Network Security-Firewall-IS Awareness (112:51)  Technical Controls - Linux OS - Kali Linux (96:22)  Threat Intelligence - BCP_DRP -BIA (98:33)  BIA, BCP, DRP, Linux, Log Management (104:05)  GRC- Ethical Hacking - Log Management (127:46)  EH Phase2 - SET- SOP - CM- Log Management-20211120_200131-Meeting Recording (123:17)  Splunk - Part 1 (21:54)
      Basic Cyber Security Foundation  Introduction to Cyber Security Foundation (1:57)  Important Defination (4:03)  CIA (11:23)  Security Governance (8:09)  NIST 800-100 (7:26)  Due Care – Due Diligences (7:23)  Identify Compliance Requirements (8:38)  Understand legal and regulatory - (2:52)  Introduction  Resources to complete your work  Security Policy Framework (24:49)
      Build a Testing Lab  The importance of your Virtual Lab (3:13)  Setup your Lab (13:18)  Client Installation (18:53)  Server Installation (12:37)  Server Configuration (3:44)  Active Directory 1 (19:35)  Active Directory 2 (4:11)  Join the domain (7:05)  What is Group Policy ? (2:31)  GPO Implementation (13:07)
      Information Asset Management  Introduction  What need to be done  How you can do it  Resources Needed to complete your work
      Risk Managment  Introduction  What need to be done  How you can do it  Resources Needed to complete your work
      Incident & Problem Managemen  Introduction  What need to be done  How you can do it  Resources Needed to complete your work
      Access Control  Introduction  What need to be done  How to do it  Resources Needed to complete your work
      Netwok Mangment  Introduction  What need to be done  How to do it  Resources Needed to complete your work
      Business Continuity Planning  Introduction  What need to be done  How to do it  Resources Needed to complete your work
      IS Aquisition, Development  Introduction  What need to be done  How you can do it  Resources Needed to complete your work
      Environmental & Physical Sec  Introduction  What need to be done  How to do it  Resources needed to complete your work
      Compliance  Introduction  What need to be done  How you can do it  Resources Needed to complete your work
      IS Assurance & Performance  Introduction  What need to be done  How you can do it  Resources Needed to complete your work
      Cyber Security Real Projects  AV Enterprose Solution  Data Classification Tool  DLP  Brand Protection Service  GRC  Security Operation Center - SOC
      IS Management & Governance  What need to be done  How you can do it

Frequently Asked Questions

This workshop on ethical hacking & cyber security is not only about training but it's REAL EXPERIENCE SHARING. In this workshop, you can learn while working in real Cyber Security Projects.

Yes, of course. Students can also pay by 08 installments of $150/month (11993 INR/month).