Cyber security can be described as the collective methods, technologies, and processes to help protect the confidentiality, integrity, and availability of computer systems, networks and data, against cyber-attacks or unauthorized access. The main purpose of cyber security is to protect all organizational assets from both external and internal threats as well as disruptions caused due to natural disasters.
With cyber-attacks evolving today as a danger to organizations, employees and customers, cyber security plays a very crucial role in prevention against such security threats If not
taken proper online security measures, this data present online can easily be exploited by cyber- criminal.
A cyber-attack is a deliberate attempt by external or internal threats or attackers to exploit and compromise the confidentiality, integrity and availability of information systems of a target organization or individual(s). Cyber-attackers use illegal methods, tools and approaches to cause damages and disruptions or gain unauthorized access to computers, devices, networks, applications and databases.
1. What is cyber security?
2. The importance and challenges of cyber security
3. What is a cyber-attack?
4. What’s the difference between a cyber-attack and a security breach?
5. 11 top cyber security best practices to prevent a breach
Cyber-attacks come in a wide variety and the following list highlights some of important ones that criminals and attackers use to exploit software:
1. Malware
2. Ransom ware
3. Injection attacks (e.g., cross-site scripting, SQL injection, command injection)
4. Session management and Man-in-the-Middle attacks
5. Phishing
6. Denial of service
7. Privilege escalations
8. Unpatched/Vulnerable software
9. Remote code execution
10. Brute force
Cyber security Content Details
Topics of Cyber security
Need of Cyber Security
Security Architecture
Security Governance
Security Auditing
Regulations & Frameworks
Ethical Hacking
Types of Hackers
Phases of Ethical Hacking
Penetration Testing
Types of Penetration Testing
Foot printing
Objectives of Foot Printing Types of Foot Printing Foot Printing Techniques
Hands-On/Demo:
Foot printing a website using who are Lookup, net craft, and shodan Gathering information about
Domain through Reon-ng Tool in Kali Linux Gathering information about Domain through Malt ego
Tool
Gathering information about Sub-domain through Sublist3r and dnsmap tool in Kali Linux
Email Foot printing using Email Tracker Pro
DNS Foot printing using DNS Interrogation Tools
Get detailed course syllabus in your inbox Download Curriculum
Cryptography
Computer Networks & Security
Application and Web Security
IdAM (Identity and Access Management)
Vulnerability Analysis & System Hacking
Sniffing and SQL Injection
DoS and Session Hijacking