Certified Cyber Intelligence
This Course gives you the essential knowledge on Information Security, understand and Defend different types of cyber-attacks. Through this course, you can also learn the concepts of Hacking, Ethical Hacking and Hacking Phases. This course also gives you knowledge on Information Security controls, Penetration testing and Information Security Laws.
Curriculum

I. Information Security Overview
a. Essential Terminology
b. Elements of information Security
c. Security, Functionality and Usability

II. Information Security Threats and Attack Vectors
a. Network Threats
b. Host Threats
c. Application Threats

III. Hacking and Ethical Concepts
a. What is Hacking and Hacker Classes?
b. What is Ethical Hacking?
c. Why Ethical Hacking is necessary?

IV. Hacking Phases
a. Foot printing and Reconnaissance
b. Scanning
c. Vulnerability Assessment
d. Gaining Access
e. Maintaining Access and Clearing Tracks

V. Information Security Controls
a. Information Assurance
b. Threat Modelling
c. Enterprise Information Security Architecture
d. Information Security Policies
e. Types of Security Policies
f. Steps to Create and Implement Security Policies
g. Incident Management Process
h. Physical Security

VI. Penetration Testing
a. What is Penetration Testing?
b. Why Penetration Testing?
c. Blue Teaming and Red Teaming
d. Types of Penetration Testing

VII. Demo on Phases of Hacking

VIII. Information Security Laws and Standards
Course Duration: 1 Day, Total Hours: 6
Fee ₹ 4499 + GST