CYBER Security
Duration: 5 Days
Day 1
Day 2
Day 3
Day 4
Day 5
Day 1
- Introduction to Data Security
- Need for Security
- Security challenges
- Trends in Security
- Security Threats and Vulnerabilities
- Understanding Threat, Vulnerability and Exploit
- Internal Threats
- External Threats
- Investigation of Social Media Crimes
- Identifying between Spoofed and Genuine WhatsApp
- Identifying and Investigating a fake Facebook Account
- Tracking Origin of Fake Instagram Account
Day 2
- Web Security
- Web Application Components
- Web Application Threats
- Web Application Counter Measures
- Firewall
- Features of Firewall
- Firewall Architecture
- Types of Firewall
- Configure Firewall
- Social Engineering
- Impact
- Target
- Types
- Counter Measures
- Best practices
Day 3
- Risk Assessment and Data Backup
- 5 Steps to Risk Assessment
- Risk Assessment Tool
- Identifying Critical Business Data
- Back up Media
- Back up Tools
- Intrusion Detection System
- Characteristics
- IDS VS Firewall
- Limitations of IDS
- Cyber Crime Scene Processing and Evidence Collection
Day 4
- Wireless Network Security
- Types of Wireless Networks
- Types of Wireless Encryption
- Wireless Threats
- Defend Against Wireless Attacks
- Malware
- Types of Malware
- Detection Measures
- Prevention Methods
- Recovery Strategies
- Investigation of Online Frauds
- Identifying and detection Fake and Fictitious bank accounts
- Tracking digital footprints of fake caller
- Identifying between genuine and spoofed online apps
Day 5
- Mobile Forensics
- Extracting data
- Data recovery
- Analysis and mining
- Documentation
- Cyber Law
- Preamble of IT ACT 2000
- Amendments in IT ACT 2000
- Penalties & Adjudications
- Caselets