CYBER SECURITY

What is cyber security?

Cyber security can be described as the collective methods, technologies, and processes to help protect the confidentiality, integrity, and availability of computer systems, networks and data, against cyber-attacks or unauthorized access. The main purpose of cyber security is to protect all organizational assets from both external and internal threats as well as disruptions caused due to natural disasters.

Why Cyber Security Is Important?

With cyber-attacks evolving today as a danger to organizations, employees and customers, cyber security plays a very crucial role in prevention against such security threats If not

taken proper online security measures, this data present online can easily be exploited by cyber- criminal.

What is a cyber-attack?

A cyber-attack is a deliberate attempt by external or internal threats or attackers to exploit and compromise the confidentiality, integrity and availability of information systems of a target organization or individual(s). Cyber-attackers use illegal methods, tools and approaches to cause damages and disruptions or gain unauthorized access to computers, devices, networks, applications and databases.

TABLE OF CONTENTS

1. What is cyber security?

2. The importance and challenges of cyber security

3. What is a cyber-attack?

4. What’s the difference between a cyber-attack and a security breach?

5. 11 top cyber security best practices to prevent a breach

Cyber-attacks come in a wide variety and the following list highlights some of important ones that criminals and attackers use to exploit software:

1. Malware

2. Ransom ware

3. Injection attacks (e.g., cross-site scripting, SQL injection, command injection)

4. Session management and Man-in-the-Middle attacks

5. Phishing

6. Denial of service

7. Privilege escalations

8. Unpatched/Vulnerable software

9. Remote code execution

10. Brute force

Cyber security Content Details

Topics of Cyber security

Need of Cyber Security

CIA Triad

Security Architecture

Security Governance
Security Auditing
Regulations & Frameworks
Ethical Hacking
Types of Hackers
Phases of Ethical Hacking
Penetration Testing
Types of Penetration Testing
Foot printing
Objectives of Foot Printing Types of Foot Printing Foot Printing Techniques
Hands-On/Demo:
Foot printing a website using who are Lookup, net craft, and shodan Gathering information about Domain through Reon-ng Tool in Kali Linux Gathering information about Domain through Malt ego Tool
Gathering information about Sub-domain through Sublist3r and dnsmap tool in Kali Linux Email Foot printing using Email Tracker Pro
DNS Foot printing using DNS Interrogation Tools
Get detailed course syllabus in your inbox Download Curriculum
Cryptography
Computer Networks & Security
Application and Web Security
IdAM (Identity and Access Management)
Vulnerability Analysis & System Hacking
Sniffing and SQL Injection
DoS and Session Hijacking