
iTillid Designed Course
Why choose iTillid for your security training.
iTillid provides best cybersecurity training program in Bangalore, India. This cybersecurity course enables you to detect vulnerablities of a system, learn techniques to compromise a host and web application, conduct risk assessment, develop policies, wardoff attacks and manage emergency situations. Taking a proactive approach to security that can help organisations to protect their data, has iTillid designed its training module based on the cybersecurity industry requirements and use real-time scenarios which can help our students to understand the market up-to its standard certification which is an add on advantage for our students to stand out of competition in a cybersecurity interview.
Our Course Work
1. Introduction
-
What is Cybersecurity
-
Scope of Cybersecurity
-
Different domains in Cybersecurity
-
Salary in different domains
2. Networking Concepts
-
Difference between TCP and UDP
-
Practical examples of TCP and UDP
-
How is your home network setup?
-
How is the corporate network setup?
-
DMZ
-
DNS
-
DHCP
-
Routers
-
Switches
-
Hubs
-
Firewall
3. Cloud
-
Introduction to cloud
-
Difference between on-prem and cloud
-
Why is everyone moving to the cloud
-
Why cloud is more secure.
4. CIA Triad
-
What is Confidentiality
-
What is Integrity
-
What is Availability
-
How Security depends on CIA.
8. Risk Management
-
What is Risk
-
What is likelihood
-
What is Vulnerability
-
How to calculate risk
-
Gap Analysis
-
How to conduct risk assessment
9. Cryptography
​
-
Symmetric Encryption
-
Asymmetric Encryption
-
Different types of Encryption and Hashing
-
What is salting and why is it used
10. Vulnerability and Pentest
-
Think like a Hacker to protect your corporate network
-
Difference between Vulnerability Scanning and Pentesting
-
Different steps involved in pentesting
-
Practical examples of how to conduct Vulnerability assessments using the following tools:
-
Nmap
-
Nikto
-
Dirbuster
-
Metasploit
-
Other tools on Kali linux
-
-
Enterprise tools
-
How to download and run Nessus to conduct Vulnerability Scan
-
Practical example of a Pentest using Kali Linux
5. Different Tools used in CyberSecurity
-
SIEM
-
IPS/IDS
-
DLP
-
CASB
-
MDR
-
Antivirus
-
DNS Filtering
-
Containment
-
Secure Email Gateway
-
Application Firewall
-
DDOS protect
-
Vulnerability Scanning tools
-
Pen testing tools
6. Different types of Attacks
-
The mindset of the Threat actor
-
Network Attacks
-
Unauthorized access
-
DDOS
-
Man in the middle attack
-
Privilege escalation
-
Insider Threats
-
Malware attacks
-
-
Network Best practices to reduce the risk of compromise
-
Segregate your network
-
Regulate access to the Internet via Proxy server
-
NAT
-
Place security devices
-
Monitor Network Devices
-
Backups
-
-
Application Attacks
-
Injection
-
Broken Authentication
-
Sensitive Data Exposure
-
XML External Entities
-
Broken Access Control
-
Security Misconfiguration
-
Cross-Site Scripting
-
Insecure Deserializations
-
Using Components with known vulnerabilities
-
Insufficient logging and monitoring
-
-
Application Best practices to reduce the risk of compromise form the above-mentioned attacks
7. Security Awareness Training
-
Juice Jacking
-
Ransomware
-
Password reuse
-
Multifactor
-
Malvertising
-
Googlian Attack
-
Keystroke logger
-
Malicious email attachment
-
Password spraying
-
Physical security
-
SIM card hijacking
-
Fake Wifi
-
Phishing
-
Smishing
-
Clean Desk
-
Call Spoofing
-
Catfishing
-
Email misdelivery
-
Telephone spoofing
-
Water Hole attack
-
Website spoofing
11. Policy, Procedure, Standards and Guidelines
-
What is Policy
-
What is Procedure
-
What is a Standard
-
What is a Guideline
-
How is all the above used to make the company more secure.
-
Practical examples of how to create different types of policy used by Corporate companies.
12. Incident Response
-
What is Incident Response.
-
What is incident Response policy
-
Practical examples of Incident response policy.
13. Business Continuity Planning
-
What is BCP
-
Why is it important for an organization?
-
Practical example of how to develop a BCP
14. Managing Identify and Authentication
-
Controlling Access to Assets
-
Comparing Identification and Authentication
-
Implementing Identity Management
-
Managing the Identity and Access Provisioning Life Cycle
15. Different Compliances
-
PCI
-
HIPPS
-
SOX
-
SOC1
-
SOC2
-
ISO