
Note: Please check your Spam or Junk folder, in case you didn't receive the email with verification code.
Non-Linear: Random Order
Equip students with technical knowledge to protect and defend against cyber threats.
Develop skills to plan, implement, and monitor cyber security mechanisms.
create responsible digital citizens who contribute to a healthy cyber security ecosystem.
Understanding of Cyber Security Concepts: Grasp the basics of cyber security, including threat landscapes, cyber crimes, and remedial measures.
Technical Proficiency: Gain skills in scripting, network security, operating systems, and database security.
Practical Application: Apply security concepts in real-world scenarios, including ethical hacking and vulnerability assessments.
Technical Skills: Scripting (Python, PowerShell), network security, operating system security, and database security.
Analytical Skills: Identifying vulnerabilities, analyzing threats, and implementing security measures.
Problem-Solving Skills: Developing solutions to security breaches and preventing future attacks.
Communication Skills: Reporting cyber crimes, collaborating with teams, and explaining security protocols to non-technical stakeholders.
Cyber Security Analyst: Assess vulnerabilities and respond to security incidents.
Ethical Hacker: Identify and mitigate security vulnerabilities in systems.
Security Consultant: Advise organizations on best practices and security measures.
Incident Responder: Respond to and manage security breaches and incidents.
Security Manager: Oversee and manage an organization's security policies and procedures.
                                                                                            
                                        Overview of cyber security landscape
                                                    
                                                    
                                                
                                                                                            
                                        CIA triad confidentiality integrity and availability
                                                    
                                                    
                                                
                                                                                            
                                        Types of cyber threats and attack vectors
                                                    
                                                    
                                                
                                                                        
                                        Cyber Security 
                                        
                                        Duration: 
                                                    
                                                    
                                                
                                                                                            
                                        Unit Test
                                                                                10 Questions
                                        
                                        
                                         
                                                    
                                                    
                                                
                                                                                            
                                        Network protocols and vulnerabilities
                                                    
                                                    
                                                
                                                                                            
                                        Firewalls and intrusion detectionprevention systems
                                                    
                                                    
                                                
                                                                                            
                                        Virtual Private Networks (VPNs)
                                                    
                                                    
                                                
                                                                                            
                                        Wireless network security
                                                    
                                                    
                                                
                                                                        
                                        Ref: Network security fundamentals
                                        
                                        Duration: 
                                                    
                                                    
                                                
                                                                                            
                                        Unit2 Test
                                                                                10 Questions
                                        
                                        
                                         
                                                    
                                                    
                                                
                                                                                            
                                        Operating System Security
                                                    
                                                    
                                                
                                                                                            
                                        Endpoint protection
                                                    
                                                    
                                                
                                                                                            
                                        Patch management and system hardening
                                                    
                                                    
                                                
                                                                                            
                                        Virtualization and cloud security basics
                                                    
                                                    
                                                
                                                                        
                                        Virtualization and cloud security basics
                                        
                                        Duration: 
                                                    
                                                    
                                                
                                                                                            
                                        Unit3
                                                                                10 Questions
                                        
                                        
                                         
                                                    
                                                    
                                                
                                                                                            
                                        Symmetric and asymmetric encryption
                                                    
                                                    
                                                
                                                                                            
                                        Hash functions and digital signatures
                                                    
                                                    
                                                
                                                                                            
                                        Public Key Infrastructure (PKI)
                                                    
                                                    
                                                
                                                                                            
                                        SSLTLS and secure communication
                                                    
                                                    
                                                
                                                                        
                                        Ref:Cryptography an Introduction
                                        
                                        Duration: 
                                                    
                                                    
                                                
                                                                                            
                                        Unit4 Test
                                                                                10 Questions
                                        
                                        
                                         
                                                    
                                                    
                                                
                                                                                            
                                        Access Control and  Authentication
                                                    
                                                    
                                                
                                                                                            
                                        Multi-factor authentication
                                                    
                                                    
                                                
                                                                                            
                                        Access control models (DAC MAC RBAC)
                                                    
                                                    
                                                
                                                                                            
                                        Single Sign-On (SSO) and federation
                                                    
                                                    
                                                
                                                                        
                                        Acess control models
                                        
                                        Duration: 
                                                    
                                                    
                                                
                                                                                            
                                        Unit5 Test
                                                                                10 Questions
                                        
                                        
                                         
                                                    
                                                    
                                                
                                                                                            
                                        OWASP Top 10 vulnerabilities
                                                    
                                                    
                                                
                                                                                            
                                        Cross-Site Scripting (XSS) and SQL injection
                                                    
                                                    
                                                
                                                                                            
                                         Security headers and secure cookies
                                                    
                                                    
                                                
                                                                                            
                                        Web Application Firewall
                                                    
                                                    
                                                
                                                                        
                                        Ref: Web application Security
                                        
                                        Duration: 
                                                    
                                                    
                                                
                                                                                            
                                        Unit6 Test
                                                                                10 Questions
                                        
                                        
                                         
                                                    
                                                    
                                                
                                                                                            
                                        Malware Analysis
                                                    
                                                    
                                                
                                                                                            
                                        Malware detection and analysis techniques
                                                    
                                                    
                                                
                                                                                            
                                        Anti-malware strategies and tools
                                                    
                                                    
                                                
                                                                        
                                        Malware Analysis
                                        
                                        Duration: 
                                                    
                                                    
                                                
                                                                                            
                                        Unit7 Test
                                                                                10 Questions
                                        
                                        
                                         
                                                    
                                                    
                                                
                                                                                            
                                        Security Information & Event Management (SIEM)
                                                    
                                                    
                                                
                                                                                            
                                        Incident detection and triage
                                                    
                                                    
                                                
                                                                                            
                                        Incident response planning and execution
                                                    
                                                    
                                                
                                                                                            
                                        Digital forensics basics
                                                    
                                                    
                                                
                                                                        
                                        Security management, GRC
                                        
                                        Duration: 
                                                    
                                                    
                                                
                                                                                            
                                        Unit8 Test
                                                                                10 Questions
                                        
                                        
                                         
                                                    
                                                    
                                                
                                                                                            
                                        Risk assessment methodologies
                                                    
                                                    
                                                
                                                                                            
                                        Developing security policies and procedures
                                                    
                                                    
                                                
                                                                                            
                                         Business continuity and disaster recovery planning
                                                    
                                                    
                                                
                                                                                            
                                        Compliance and regulatory requirements (e.g GDPR HIPAA)
                                                    
                                                    
                                                
                                                                        
                                        Ref: Assessment of Risk
                                        
                                        Duration: 
                                                    
                                                    
                                                
                                                                                            
                                        Unit9 Test
                                                                                10 Questions
                                        
                                        
                                         
                                                    
                                                    
                                                
                                                                                            
                                        Secure coding practices
                                                    
                                                    
                                                
                                                                                            
                                        Software Development Life Cycle (SDLC) security
                                                    
                                                    
                                                
                                                                                            
                                        Code review and static analysis tools
                                                    
                                                    
                                                
                                                                                            
                                        DevSecOps principles
                                                    
                                                    
                                                
                                                                        
                                        Secure coding practices
                                        
                                        Duration: 
                                                    
                                                    
                                                
                                                                                            
                                        Unit10 Test
                                                                                10 Questions
                                        
                                        
                                         
                                                    
                                                    
                                                
                                                                                            
                                        Mobile device management
                                                    
                                                    
                                                
                                                                                            
                                        App security and OWASP Mobile Top 10
                                                    
                                                    
                                                
                                                                                            
                                         IoT security challenges and best practices
                                                    
                                                    
                                                
                                                                                            
                                        Securing smart home and industrial IoT devices
                                                    
                                                    
                                                
                                                                        
                                        Ref:IoT security
                                        
                                        Duration: 
                                                    
                                                    
                                                
                                                                                            
                                        Unit11 Test
                                                                                10 Questions
                                        
                                        
                                         
                                                    
                                                    
                                                
                                                                                            
                                        Cloud service models and their security implications
                                                    
                                                    
                                                
                                                                                            
                                         Shared responsibility model
                                                    
                                                    
                                                
                                                                                            
                                        Cloud-specific threats and mitigation strategies
                                                    
                                                    
                                                
                                                                                            
                                         Cloud security best practices and tools
                                                    
                                                    
                                                
                                                                        
                                        Ref: Foundation of Privacy
                                        
                                        Duration: 
                                                    
                                                    
                                                
                                                                                            
                                        Unit12 Test
                                                                                10 Questions
                                        
                                        
                                         
                                                    
                                                    
                                                
                                                                                            
                                        Ethical hacking methodology
                                                    
                                                    
                                                
                                                                                            
                                        Reconnaissance and scanning techniques
                                                    
                                                    
                                                
                                                                                            
                                        Exploitation and post-exploitation
                                                    
                                                    
                                                
                                                                                            
                                         Reporting and remediation
                                                    
                                                    
                                                
                                                                        
                                        Ref: Ethical Hacking
                                        
                                        Duration: 
                                                    
                                                    
                                                
                                                                                            
                                        Unit13 Test
                                                                                10 Questions
                                        
                                        
                                         
                                                    
                                                    
                                                
                                                                                            
                                        Artificial Intelligence and Machine Learning in
                                                    
                                                    
                                                
                                                                                            
                                        Blockchain and its security implications
                                                    
                                                    
                                                
                                                                                            
                                        Quantum computing and post-quantum cryptography
                                                    
                                                    
                                                
                                                                                            
                                        Zero Trust security model
                                                    
                                                    
                                                
                                                                        
                                        Ref: Web Application Vulnerability Scanning
                                        
                                        Duration: 
                                                    
                                                    
                                                
                                                                                            
                                        Unit14 Test
                                                                                10 Questions
                                        
                                        
                                         
                                                    
                                                    
                                                
                                                                                            
                                        Cybercrime and cyber law basics
                                                    
                                                    
                                                
                                                                                            
                                        Ethical considerations in security research
                                                    
                                                    
                                                
                                                                                            
                                        Privacy regulations and data protection
                                                    
                                                    
                                                
                                                                                            
                                        Professional ethics for security practitioners
                                                    
                                                    
                                                
                                                                        
                                        Ref:Ethical Hacking
                                        
                                        Duration: 
                                                    
                                                    
                                                
                                                                                            
                                        Unit15 Test
                                                                                10 Questions
                                        
                                        
                                         
                                                    
                                                    
                                                
                                                                                            
                                        Final Test
                                                                                20 Questions
                                        
                                        
                                         
                                                    
                                                    
                                                The certificate issued for the Course will have
Only the e-certificate will be made available. No Hard copies. The certificates issued by SST College of Arts and Commerce Mumbai. can be e-verifiable at www.ulektzskills.com/verify.
 
	   
                          
                
                                         
                
                
40 hours Learning Content
100% online Courses
English Language
Certifications