uLektz logo
login images close

Verify Account

A Verification Code has been sent to you registered email address shown below. Please enter the code to verify your account. You may edit the email address, if it is incorrect

Resend Code

Note: Please check your Spam or Junk folder, in case you didn't receive the email with verification code.

Learning Path

Non-Linear: Random Order

About the Course

Course Objectives

  • Equip students with technical knowledge to protect and defend against cyber threats.

  • Develop skills to plan, implement, and monitor cyber security mechanisms.

  • create responsible digital citizens who contribute to a healthy cyber security ecosystem.

Learning Outcomes

  • Understanding of Cyber Security Concepts: Grasp the basics of cyber security, including threat landscapes, cyber crimes, and remedial measures.

  • Technical Proficiency: Gain skills in scripting, network security, operating systems, and database security.

  • Practical Application: Apply security concepts in real-world scenarios, including ethical hacking and vulnerability assessments.

Skills Developed

  • Technical Skills: Scripting (Python, PowerShell), network security, operating system security, and database security.

  • Analytical Skills: Identifying vulnerabilities, analyzing threats, and implementing security measures.

  • Problem-Solving Skills: Developing solutions to security breaches and preventing future attacks.

  • Communication Skills: Reporting cyber crimes, collaborating with teams, and explaining security protocols to non-technical stakeholders.

Career Path

  • Cyber Security Analyst: Assess vulnerabilities and respond to security incidents.

  • Ethical Hacker: Identify and mitigate security vulnerabilities in systems.

  • Security Consultant: Advise organizations on best practices and security measures.

  • Incident Responder: Respond to and manage security breaches and incidents.

  • Security Manager: Oversee and manage an organization's security policies and procedures.

.

Course Study Materials
Introduction to Cyber Security
  • Overview of cyber security landscape
  • CIA triad confidentiality integrity and availability
  • Types of cyber threats and attack vectors
  • Reference: Cyber Security Duration:
  • Unit1 Test 10 Questions
Network Security Fundamentals
  • Network protocols and vulnerabilities
  • Firewalls and intrusion detectionprevention systems
  • Virtual Private Networks (VPNs)
  • Wireless network security
  • Ref: Network security fundamentals Duration:
  • Unit2 Test 10 Questions
System Security
  • Operating System Security
  • Endpoint protection
  • Patch management and system hardening
  • Virtualization and cloud security basics
  • Virtualization and cloud security basics Duration:
  • Unit3 Test 10 Questions
Cryptography
  • Symmetric and asymmetric encryption
  • Hash functions and digital signatures
  • Public Key Infrastructure (PKI)
  • SSLTLS and secure communication
  • Ref:Cryptography an Introduction Duration:
  • Unit4 Test 10 Questions
Access Control and Authentication
  • Access Control and Authentication
  • Multi-factor authentication
  • Access control models (DAC MAC RBAC)
  • Single Sign-On (SSO) and federation
  • Acess control models Duration:
  • Unit5 Test 10 Questions
Web Application Security
  • OWASP Top 10 vulnerabilities
  • Cross-Site Scripting (XSS) and SQL injection
  • Security headers and secure cookies
  • Web Application Firewall
  • Ref: Web application Security Duration:
  • Unit6 Test 10 Questions
Malware Analysis and Defense
  • Malware Analysis
  • Malware detection and analysis techniques
  • Anti-malware strategies and tools
  • Malware Analysis Duration:
  • Unit7 Test 10 Questions
Security Operations and Incident Response
  • Security Information & Event Management (SIEM)
  • Incident detection and triage
  • Incident response planning and execution
  • Digital forensics basics
  • Security management, GRC Duration:
  • Unit8 Test 10 Questions
Risk Management and Security Policies
  • Risk assessment methodologies
  • Developing security policies and procedures
  • Business continuity and disaster recovery planning
  • Compliance and regulatory requirements (e.g GDPR HIPAA)
  • Ref: Assessment of Risk Duration:
  • Unit9 Test 10 Questions
Secure Software Development
  • Secure coding practices
  • Software Development Life Cycle (SDLC) security
  • Code review and static analysis tools
  • DevSecOps principles
  • Secure coding practices Duration:
  • Unit10 Test 10 Questions
Mobile and IoT Security
  • Mobile device management
  • App security and OWASP Mobile Top 10
  • IoT security challenges and best practices
  • Securing smart home and industrial IoT devices
  • Ref:IoT security Duration:
  • Unit11 test 10 Questions
Cloud Security
  • Cloud service models and their security implications
  • Shared responsibility model
  • Cloud-specific threats and mitigation strategies
  • Cloud security best practices and tools
  • Ref: Foundation of Privacy Duration:
  • Unit12 Test 10 Questions
Ethical Hacking and Penetration Testing
  • Ethical hacking methodology
  • Reconnaissance and scanning techniques
  • Exploitation and post-exploitation
  • Reporting and remediation
  • Ref: Ethical Hacking Duration:
  • UInit13 Test 10 Questions
Emerging Trends in Cyber Security
  • Artificial Intelligence and Machine Learning in
  • Blockchain and its security implications
  • Quantum computing and post-quantum cryptography
  • Zero Trust security model
  • Ref: Web Application Vulnerability Scanning Duration:
  • Unit14 Test 10 Questions
Legal and Ethical Aspects of Cyber Security
  • Cybercrime and cyber law basics
  • Ethical considerations in security research
  • Privacy regulations and data protection
  • Professional ethics for security practitioners
  • Ref:Ethical Hacking Duration:
  • Unit15 Test 10 Questions
Final Assessment
  • Final Assessment 30 Questions

The certificate issued for the Course will have

  • Student's Name
  • Photograph
  • Course Title
  • Certificate Number
  • Date of Course Completion
  • Name(s) and Logo(s) of the Certifying Bodies
  • .

    Only the e-certificate will be made available. No Hard copies. The certificates issued by Odisha State Open University, Sambalpur. can be e-verifiable at www.ulektzskills.com/verify.

    • Students will be assessed both at the end of each module and at the end of the Course.
    • Students scoring a minimum of 50% in the assessments are considered for Certifications
    certificate
...
₹588.82
Features:
  • 90 hours Learning Content
  • 100% online Courses
  • English Language
  • Certifications

Course

Registration opens on 04-02-2019

Course

Your registration details are under review. It should take about 1 to 2 working days. Once approved you will be notified by email and then you should be able to access the course.

Course Approved

Approval Pending - In-Progress

Course access details will be shared within 24 hours.
For help contact: support@ulektz.com

Course Enrollment

Course

Course starts on 02-01-2025

Course

You have completed 6 hours of learning for 31-08-2025. You can continue learning starting 01-09-2025.

Course

This course can only be taken in sequential order.

Course

You have completed the course. You will be notified by email once the certificate is generated.

Course

Are you sure want to enroll this course?.

Course

Course

S.no Date Title Reason

Result Summary

Cybersecurity