uLektz logo
login images close

Verify Account

A Verification Code has been sent to you registered email address shown below. Please enter the code to verify your account. You may edit the email address, if it is incorrect

Resend Code

Note: Please check your Spam or Junk folder, in case you didn't receive the email with verification code.

Learning Path

Linear: Sequential Order

About the Course

CERTIFICATION COURSES

 

INSTRUCTIONAL DESIGN

The university offers Online Self-paced Learning courses of about 60 hours with 4 credits each. These courses are designed to provide a comprehensive and engaging learning experience, adopting of (4) Four-Quadrant Approach i.e., eContent, eTutorials, Self-Assessments and Discussion Board.

 

METHODOLOGY

To ensure effective understanding, knowledge retention and practical applications, these courses use the following methodology:

1.      Self-paced online course delivered with four-quadrant approach

2.      Unit-wise Structured Course with

3.      Modular MCQ-based Self-Assessments

4.      Assignments for Practical Applications

5.      24x7 Online Community Support from Peers and Faculty

6.      Periodic Live Interactive Sessions by Industry Professionals

7.      Flexible Course Duration with a minimum of 1 month to a maximum of 1 year.

8.      Final Examination (3 hours) after completing 60 hours of learning

a.      Early Examination in limited centres near Regional Centres (RCs)

b.      Regular Examination twice a year (Semester Pattern) near the students’ location.

Course Objectives

1.      Understand fundamental concepts and principles of cyber security

2.      Develop knowledge of various types of cyber threats and attack vectors

3.      Learn techniques for securing networks, systems, and applications

4.      Understand cryptography and its applications in cyber security

5.      Develop skills in risk assessment and management in the context of information security

6.      Gain practical experience in implementing security measures and responding to incidents

 

Course Outcomes

By the end of this course, students will be able to:

1.      Explain core cyber security concepts and their importance in the digital landscape

2.      Identify and analyze various types of cyber threats and vulnerabilities

3.      Implement basic security measures to protect networks, systems, and data

4.      Apply cryptographic techniques to ensure data confidentiality and integrity

5.      Conduct basic risk assessments and develop security policies

6.      Demonstrate understanding of ethical and legal issues in cyber security

7.      Perform basic digital forensics and incident response procedures

8.      Implement access control and authentication mechanisms

9.      Understand and apply secure coding practices

10.  Evaluate and recommend appropriate security solutions for different scenarios

.

Course Study Materials
Introduction to Cyber Security
  • Overview of cyber security landscape
  • CIA triad Confidentiality Integrity and Availability
  • Types of cyber threats and attack vectors
  • Assessment 5 Questions
Network Security Fundamentals
  • Network protocols and vulnerabilities
  • Firewalls and intrusion detectionprevention systems
  • Virtual Private Networks (VPNs)
  • Wireless network security
  • Assessment 5 Questions
System Security
  • Operating System Security
  • Endpoint protection
  • Patch management and system hardening
  • Virtualization and cloud security basics
  • Assessment 5 Questions
Cryptography
  • Symmetric and asymmetric encryption
  • Hash functions and digital signatures
  • Public Key Infrastructure (PKI)
  • SSLTLS and secure communication
  • Assessment 5 Questions
Access Control and Authentication
  • Authentication Methods and Protocols
  • Multifactor authentication
  • Access control models _DAC MAC RBAC
  • Single Sign-On (SSO) and federation
  • Assessment 5 Questions
Web Application Security
  • OWASP Top 10 vulnerabilities
  • Cross-Site Scripting -XSS-and SQL injection
  • Security headers and secure cookies
  • Web Application Firewall
  • Assessment 5 Questions
Malware Analysis
  • Types of Malware (viruses worms trojans ransomware)
  • Malware detection and analysis techniques
  • Anti-malware strategies and tools
  • Assessment 5 Questions
Security operation and incident response
  • Security Information & Event Management (SIEM)
  • Incident detection and triage
  • Incident response planning and execution
  • Digital forensics basics
  • Assessment 5 Questions
Risk Management and Security Policies
  • Risk assessment methodologies
  • Developing security policies and procedures
  • Business continuity and disaster recovery planning
  • Compliance and regulatory requirements
  • Assessment 5 Questions
Secure Software Development
  • Secure coding practices
  • Software Development Life Cycle (SDLC) security
  • Code review and static analysis tools
  • DevSecOps principles
  • Assessment 5 Questions
Mobile and IoT Security
  • Mobile device management
  • App security and OWASP Mobile
  • IoT security challenges and best practices
  • Securing smart home and industrial IoT devices
  • Assessment 5 Questions
Cloud Security
  • Cloud service models and their security implications
  • Shared responsibility model
  • Cloud-specific threats and mitigation strategies
  • Cloud security best practices and tools
  • Assessment 5 Questions
Ethical Hacking
  • Ethical hacking methodology
  • Reconnaissance and scanning techniques
  • Exploitation and post-exploitation
  • Reporting and remediation
  • Assessment 5 Questions
Emerging trends in Cyber Security
  • Artificial Intelligence and Machine Learning in security
  • Blockchain and its security implications
  • Quantum computing and post-quantum cryptography
  • Zero Trust security model
  • Assessment 5 Questions
Legal and Ethical aspects of cyber security
  • Cybercrime and cyber law basics
  • Ethical considerations in security research
  • Privacy regulations and data protection
  • Professional ethics for security practitioners
  • Assessment 5 Questions
Final Assessment
  • Final Assessment 50 Questions

The certificate issued for the Course will have

  • Student's Name
  • Photograph
  • Course Title
  • Certificate Number
  • Date of Course Completion
  • Name(s) and Logo(s) of the Certifying Bodies
  • .

    Only the e-certificate will be made available. No Hard copies. The certificates issued by Odisha State Open University, Sambalpur. can be e-verifiable at www.ulektzskills.com/verify.

    • Students will be assessed both at the end of each module and at the end of the Course.
    • Students scoring a minimum of 50% in the assessments are considered for Certifications
    certificate
...
â‚ą600
Features:
  • 60 hours Learning Content
  • 100% online Courses
  • English Language
  • Certifications

Course

Registration opens on 04-02-2019

Course

Your registration details are under review. It should take about 1 to 2 working days. Once approved you will be notified by email and then you should be able to access the course.

Course Approved

Approval Pending - In-Progress

Course access details will be shared within 24 hours.
For help contact: support@ulektz.com

Course Enrollment

Course

Course starts on 02-09-2024

Course

You have completed 6 hours of learning for 13-01-2025. You can continue learning starting 14-01-2025.

Course

This course can only be taken in sequential order.

Course

You have completed the course. You will be notified by email once the certificate is generated.

Course

Are you sure want to enroll this course?.

Course

uLektz Learning Solutions

in association with Odisha State Open University, Sambalpur

hereby certifies that

has successfully completed the
Emerging Technologies and Applications-Cyber Security (CCS-01)

January 13, 2025

Date

Dr MSN Moorthy

COO

Certificate No:

Sadiq Sait

CEO and Founder

Course

S.no Date Title Reason

Result Summary

Emerging Technologies and Applications-Cyber Security (CCS-01)