CICSE
Certified Information and Cyber Security Expert – 6 Months
Course Level: Intermediate
These courses will help beginners and experienced to enter into cyber security field by gain ng knowledge of various cyber security requirements, current practices, threats,techniques from industry experts.
This training aims to make working professionals adept at evaluating, securing and controlling complex business and IT systems in an enterprise. This course will also highlight government regulations and helps devise policies with stronger internal control measures and disclosures.
It provides comprehensive training for participants who wish to gain expertise in defining the design, architecture, management and controls leading to a secure business environment.
Participatence will learn different regulations and its requirements like ISO, GDPR, PCI etc.
This course will provide :
· Understand the basics of telecommunication and network security concepts, required components for minimizing security risks, securing channels of communication, and techniques for preventing and detecting network-based attacks.
· Identify the key terms and processes of security operations and how to protect and control information processing assets in a centralized or distributed environment in this training.
· Define and apply information security governance and Risk Management Framework including the policies, concepts, principles, structures and standards that are established for the protection of information assets and how to assess the effectiveness of that protection
· Gain the required skills to design the architecture and manage IT security in an enterprise environment through this course
Course Contents
MODULES |
COURSE CONTENT |
MODULE 1 |
IT SECURITY FUNDAMENTALS |
MODULE 2 |
NETWORK SECURITY |
MODULE 3 |
SERVER SECURITY |
MODULE 4 |
APPLICATION SECURITY |
MODULE 5 |
IDENTITY AND ACCESS MANAGEMENT |
MODULE 6 |
INFRASTRUCTURE AND NETWORK SECURITY |
MODULE 7 |
IT RISK MANAGEMENT GOVERNANCE AND COMPLIANCE |
MODULE 8 |
IT AUDITING |
MODULE 9 |
INFORMATION SECURITY MANAGEMENT SYSTEM |
MODULE 10 |
BUSINESS CONTINUITY MANAGEMENT |
MODULE 11 |
IT ACT AND STANDARDS |
MODULE 12 |
GDPR – EU – GENERAL DATA PROTECTION REGULATION |
MODULE 13 |
PCI-DSS STANDARDS |
MODULE 14 |
INDIA DATA PROTECTION LAW |
MODULE 15 |
ETHICAL HACKING AND ATTACK TECHNIQUES |
MODULE 16 |
SECURITY OPERATION CENTER |
MODULE 17 |
LOG MANAGEMENT |
MODULE 18 |
SIEM(SECURITY INFORMATION AND EVENT MANAGEMENT) |
MODULE 19 |
SECURITY INCIDENT MANAGEMENT |
MODULE 20 |
VULNERABILITY ASSESSMENT AND REMEDIATION |
MODULE 21 |
PENETRATION TESTING |
MODULE 22 |
FORENSIC INVESTIGATION |
MODULE 23 |
THREAT INTELLIGENCE AND MANAGEMENT |