Posted by : Sivapriya Thursday, 14 November 2019

ABOUT THIS COURSE 
This course is designed to introduce students, working professionals and the community to the exciting field of cybersecurity. Throughout the training, participants will engage in community discourse and online interaction. Participants will gain knowledge and understanding of cybersecurity and its domains. 


They will engage with expertly produced videos, gain insight from industry experts, participate in knowledge assessments, practice assessing their environmental awareness, and gain access to materials that address governance and risk management, compliance, business continuity and disaster recovery, cryptography, software development security, access control, network security, security architecture, security operations, and physical and environmental security. 

Learning will be assessed using strategies aligned to knowledge and understanding. You do not need prior experience in IT security to do well in this course. All you need is a willingness to learn. We will point you to relevant open and free resources to assist you.

LEARNERS TAKING THIS COURSE ARE
  • Security Engineers
  • Risk Managers
  • IT Support
  • Technical Support Associates
  • System Administrators

Syllabus - What you will learn from this course

Course Overview
Introduction to Security, Access Control, and Software Development Security
In this module we cover some of the fundamentals of security that will assist you throughout the course. We will then introduce you to two domains of cyber security: access control and software development security. Focus will be on areas such as confidentiality, integrity, and availability, as well secure software development techniques.

Business Continuity and Disaster Recovery Planning and Cryptography
In this module we are going to delve a little deeper into cyber security by covering business continuity and disaster recovery planning and cryptography. Learners will be exposed to what a disruptive event is and how the federal government through agencies such as FEMA handles disasters. We will also covers encryption and decryption and the various techniques used.

Information Security Governance and Risk Management & Legal, Regulations, Investigations, and Compliance
In this module we are going to cover some of the non-technical topics associated to cyber security: Information security governance and risk management and legal, regulations, investigations, and compliance. It is important to realize, that non-technical does not mean easy, or not important. In fact, I would like to argue that they are more important that the technical side of cyber security.

Operations Security & Physical and Environmental Security
In this module we are going to cover what amount to some of the more intuitive parts of cybersecurity: operations security and physical and environmental security. Learners will understand operations security from a competitor/enemy/hacker’s viewpoint and then develop and apply countermeasures accordingly. Learners will also be exposed to electric power issues such as brownouts, fire detection and suppression, and HVAC.

Security Architecture and Design & Telecommunications and Network Security
In this module we are going to cover some of the most technical and comprehensive topics that cyber security has to offer as we look at Security Architecture and Design and Telecommunications and Network Security. Learners will be exposed to security models such as, Mandatory Access Control (MAC), Discretionary Access Control (DAC), Role-Based Access Control (RBAC), and Access Matrix. We will also describe the Open Systems Interconnect (OSI) model and its seven layers.

For More Details :
Redback IT Academy 
No : 5/X2 , Hari Ohm 2nd street, 
Phase III, Sathuvachari, Vellore.
+91 8189985551.

Leave a Reply

Subscribe to Posts | Subscribe to Comments


widget

Pageviews

Cloud Label

Blogumulus by Roy Tanck and Amanda Fazani

Blog Archive

- Copyright © 2013 Redback IT Academy -- Powered by Redback - Designed by @ Redback Studio -