CYBER SECURITY

Get a baseline understanding of common cyber security threats, vulnerabilities, and risks. Learn about forensics, firewalls, security algorithms and encryption techniques within the cybersecurity domain. Upskill Now!

Demo Videos

Things you will learn

  • Understand the basic concepts and terminologies used in the information and cyber security fields.
  • Understand how hackers actually hack.
  • You will be trained in all the ways hackers can socially engineer you, through email, text, calls, browsing, files, mobile phones, connected home devices, etc.
  • You will stop successful social engineering attacks, by spotting red flags in phishing emails, text messages and phone calls.
  • You will be shown proven and effective cyber security software to keep your systems private and secure.
  • You will learn cyber security awareness and online self defence to protect yourself?
  • Intern with us on live projects.
  • Develop an insight of a Artificial intelligence queer
  • Know which algorithm/ model to implement at different problem statements
Join Course

Key highlights

  • 21 hours of video lectures
  • Lifetime LMS access for study contents
  • Study on mobile or laptop
  • Live or recorded sessions
  • Dedicated mentorship assistance
  • Industrial projects (1 minor+1 major)
  • Certificate of completion
  • Internship opportunities

Tools you can work hands on

Cyber Security

Program curriculum

Module 1 - Introduction to Ethical Hacking

  • What is Hacking?
  • Hacker Classes
  • Ethical Hacking
  • Threat, Vulnerability and Risk
  • Importance of InfoSec
  • CIA Triad
  • Security, Functionality and Usability
  • Hacking Methodologies

Module 2 - Reconnaissance

  • Footprinting
  • Procedures in Reconnaissance
  • Data Retrieval Scope
  • Footprinting Methods
  • Reconnaissance Methods
  • Active and Passive Reconnaissance

Module 3 - Scanning

  • Why scanning?
  • Objectives of Network Scanning
  • Communication Flags
  • Types of Scan
  • Identifying results from Scans

Module 4 - Gaining and Maintaining Access

  • Enumeration
  • Information Enumerated
  • Types of Enumeration
  • Enumeration Tools
  • Gaining Access
  • Maintaining Access
  • Clearing Tracks
  • Hacking Stages
  • Penetration Testing

Module 5 - Sniffing and Passwords

  • System Hacking steps
  • Password Complexity
  • Password Cracking Techniques
  • Defence against Password Attacks
  • Sniffing
  • Types of Sniffing Attacks
  • ARP Poisoning
  • MAC Flooding
  • DNS poisoning
  • DHCP Attack
  • Sniffing Tools
  • Defence against Sniffing Attacks

Module 6 - Worms, Viruses & Trojans

  • Trojan
  • Communication Channels
  • What do hackers look for?
  • Goals of Trojan
  • Types of Trojans
  • Indication of a Trojan Attack
  • Trojan Tools
  • Computer Worm
  • How Viruses work?
  • Types of Viruses
  • Counter Measures for Viruses and Worms
  • Computer Virus

Module 7 - System Security

  • DOS/DDOS Attack
  • How does DOS work?
  • Symptoms of DOS
  • Session Hijacking
  • XSS Attack
  • Steps involved
  • Session Hijacking Tools
  • Prevention against Session
  • Hijacking
  • DOS Techniques
  • DOS Counter Measures

Module 8 - Web & Network Security

  • How web applications work
  • SQL Injection Attack
  • Wireless networks
  • Wireless Hacking
  • Methodologies
  • IDS/IPSs
  • Firewalls
  • WEP
  • WPA

Module 9 - Vulnerability & Management Reporting

  • Vulnerability Assessment
  • Vulnerability Management Process
  • Phases of Vulnerability Management
  • Report Writing
  • Constituents of a Report
Download Brochure

Advance plans

Choose your plan of action. Grow and ace with us.

Cyber Security [Self Paced]

5700

 

  • ✅ Self Paced Learning Course for Cyber Security
  • ✅ Learn to create a Project Initiation Document that spells out the people, resources, and budget for the project.
  • ✅ Learn to use the S.M.A.R.T. and C.L.E.A.R. processes to set concrete, specific goals for your project.
  • ✅ Gather data on key performance indicators (KPIs) such as objectives, performance, and quality.
  • ✅ Learn about the Critical Path Method and how to compute it.
  • ✅ Understand Programme Evaluation & Review Technique
  • ✅ Intern with us on live projects.
  • ✅ Hands-on projects to apply what you have learned and develop your skills in a real-world setting.
  • ✅ Get certified with us and stand out in the job market
  •  
  •  
  • Have a coupon code?

Cyber Security [Mentor Led]

8500

 

  • ✅ Mentor Led Course for Cyber Security
  • ✅ Learn to create a Project Initiation Document that spells out the people, resources, and budget for the project.
  • ✅ Learn to use the S.M.A.R.T. and C.L.E.A.R. processes to set concrete, specific goals for your project.
  • ✅ Gather data on key performance indicators (KPIs) such as objectives, performance, and quality.
  • ✅ Learn about the Critical Path Method and how to compute it.
  • ✅ Understand Programme Evaluation & Review Technique
  • ✅ Intern with us on live projects.
  • ✅ Hands-on projects to apply what you have learned and develop your skills in a real-world setting.
  • ✅ Regular Doubt Clearing Session to ensure you have the opportunity to ask questions
  • ✅ Our Experienced mentors will provide personalized feedback and support to help you succeed.
  • ✅ Become a part of an invaluable network and connect with them.
  •  
  •  
  • Have a coupon code?
×

Contact Details

 

 
 
 
 

Total Amount

 

Capstone projects

Undergo practical learning and work on real time projects

LEARN TO RUN EXPLOITS ON TARGET MACHINES.
LEARN TO CREATE VIRUSES AND TROJANS.
USE ENUMERATION TOOLS TO FIND INFORMATION ABOUT THE SYSTEM.
CRACK SYSTEM PASSWORDS AND ACCOUNT PASSWORDS FOR WEBSITES.

Certification

For your dedication and commendable efforts to learning, for completion of the training as well as the projects accurately and within the timelines given, you earn industry-recognized certifications.

Who provides the certification?

On successful completion of your program, you are eligible to receive a certificate of completion from SkillVertex

How long is the certification valid for?

By taking an upskilling program with SkillVertex and completing your program, you get your certification which has validity of a lifetime.

How can I avail my certificate?

After completion of your program of entire training module and assessments, you are eligible to obtain your certificate from SkillVertex.

Testimonials

What our Students say about us

What are the available modes of payment?

As a user, you can avail a the payment mode of your choice. The available modes are: UPI, debit/credit card, No cost EMI, Netbanking/Mobile banking.

What is the duration of the programs?

When enrolling into SkillVertex's training upskilling programs, you are associated with us for a duration of 2 months. Where as, with SkillVertex's Advance Upskilling programs, you are associated with us for a duration of 5 months.

Who will I be mentored by?

At SkillVertex, you are mentored by industry experts who have been/are working in the industry for a decent time and have a strong grasp in their domain of expertise. The process is tailored to provide concept clear training and practical hands-on learning during your upskilling journey.