Cyber Security Analyst


Cybersecurity or IT security, is security applied to computers, computer networks, and the data stored and transmitted over these networks. This field is growing in importance because businesses and individuals are relying more and more on computer systems.

Today, computer systems include traditional personal computers, smart devices, such as smartphones, televisions and tiny devices, smart watches, television sets as a part of the Internet of Things. Just like computers have started including wider range of devices, the network is now a collective term used to include the Internet, private data networks, Bluetooth, Wi-Fi, and other wireless networks.

Cyber security professionals create processes and mechanisms to protect digital equipment, information and services from unintended or unauthorized access, change, or destruction. They also implement measures to ensure confidentiality, integrity, and availability of data in use, transit, or at rest.


Courses Offered:

Learn the current risks and threats to an organization’s data together with ways to safeguard critical electronic assets, including network services, devices, traffic, and data. Develop a foundation to prepare for further study in specialized security fields. This course partially addresses the core material of the CompTIA Security+ exam objectives.






Login to enroll for this course

Module 1 Network Security
Unit 1 Basic Network Devices
Unit 2 Security Management Systems and Devices
Unit 3 Protocols Ports and Services
Unit 4 Secure Network Principles
Unit 5 Secure Network Techniques
Unit 6 Segmentation and Network Access
Unit 7 Wireless Networks
Unit 8 Wireless Attacks and Protection
Unit 9 Cloud Computing and Virtualization
Module 2 Compliance and Operational Security
Unit 1 Risk Assessment and Control Types
Unit 2 Risk Mitigation
Unit 3 Risk Management
Unit 4 Environmental Controls
Unit 5 Physical Controls
Unit 6 Digital Forensics and Incident Response Procedures
Module 3 Threats and Vulnerabilities
Unit 1 Social Engineering Attacks
Unit 2 Security Training
Unit 3 Areas of Security Training
Unit 4 Types of Malware
Unit 5 Client-side and Server-side Attacks
Unit 6 Injection and Code Type Attacks
Unit 7 Web and Other Attacks
Unit 8 Threat Deterrent Techniques
Unit 9 Assessment Techniques
Unit 10 Assessment Tools
Unit 11 Vulnerability Scanning and Penetrating Testing
Module 4 Application, Data, and Host Security
Unit 1 Application Security
Unit 2 Mobile Devices and Application Security
Unit 3 Host and Static Environment Security
Unit 4 Data Storage and Policies
Module 5 Access Control
Unit 1 Authentication Services
Unit 2 Access Controls
Unit 3 Account Policies
Module 6 Cryptography
Unit 1 Cryptography Concepts
Unit 2 Cryptographic Methods
Unit 3 PKI, Certificate Management and Associated Components
Module 7 Learning Game for Revision
Unit 1 The Abbreviation Challenge

* = Coming Soon