7.5 million cyber security jobs expected to open by 2025 but with no cyber-security training courses from the engineering schools being available, there is a big need for industry to come forward and bridge this gap.

Considering all available facts & need, industry experts have jointly developed 12 weeks Cyber Security Engineering course with intensive hands-on Windows, Linux, Networking Security, Splunk, ArcSight.

Next session in Bangalore with a mentor-ship support for top jobs in security space like Security Operation Engineer, Security Analyst, Threat Management Analyst, Network Security Engineer, Vulnerability testing engineer, Cyber tools Administrator.

Our Cyber Security Engineering course is designed by the industry experts so that this gap can be rapidly addressed with placement.

Course Description

Created for providing cyber security experience by industry experts, this course focuses on the most common cyber security problems and helps you to understand the techniques through hands-on classes. To accomplish this, the course describes outcome, objectives, duration and high level content.

Additionally, this course also presents practical walk through that demonstrate how the engineers have to be prepared for the cyber security industry requirements.

Mentorship Program for top jobs in security Space

Security Operations Engineer

Network Security Support

Security Analyst

Threat Management Analyst

Vulnerability Testing Engineer

Cyber Tools Administration

COURSE DETAILS

Duration: 12 Weeks

Course Size: 12 Candidates Only (Hurry Up! Only Few seats left)

Course Type: Class Room Based in Bangalore

Start date: Aug and Nov 2023

Course Hours: Theory (40%), Lab (60%) – 8 hours per day

Location: Kasturi Nagar, Bangalore

Laptop: Candidate needs to bring his laptop with at least 8 GB of RAM

Course Price: Send an email to info@delamap.com

 

COURSE OBJECTIVES

  • Describe the role of cyber security in the information technology life-cycle
  • Strategize how best to create secure applications, how best to detect security issues and how best to recommend in fixing security threat issues
  • Recognize the details of and the causes behind cyber security vulnerabilities and security errors and mistakes
  • Describe how cyber security threats are exploited
  • Efficiently utilize discovery methods for uncovering cyber security defects
  • Strategize practices to help prevent the most common mistakes and ultimately create more secure environment

LEARNING OUTCOME

  • Introduce the most prevalent cyber security issues
  • Describe testing methods and applications
  • Provide remediation guidance to help specific security issues
  • Demonstrate how the issues are exploited by attackers
  • Cyber security tools management for analysis

LEARNING OUTCOME

Basic Understanding of OS, Programming Languages

Bachelor’s degree with some basic courses in computers

Interview for qualifying before enrolling into course

Course COntent

Install, operate, and troubleshoot a small to medium-size enterprise branch network. Implement Switching, routing, wan, TCP/IP, VLAN, OSI, Routes,

  • ACL,CISCO IOS, ping, tracert, SNMP, Ethernet, IPV4 addressing, Address Blocks, VSM, Layer2 and Layer 3 routing, ARP, NAT, Device Security, OSPF, Spanning Tree, EIGRP, HSRP, Multi Area OSPF.,WireShark
  • The Transport Layer and Router Configuration, Packet Delivery and Static Routing, Access Control Lists and Network Address Translation,Managing Network Device Security, VLANs and DHCP, Set up multiple VLANS, Trunking, ACL, Trouble Shooting
  • Set up VLANS, NAT, DHCP, AC. Troubleshoot problems. Learn to segment the networks. Static Routes. NAT labs
    WANs and Dynamic Routing Protocols, VLANs and Spanning-Tree, EtherChannel and Layer 3 Redundancy, Troubleshooting Basic Connectivity, EIGRP Solution,
  • Scalable, Multi area Network, Wan, Firewall, VPN, 2 Factor Auth implementations
  • Configure Auth, Authorization , Hardening, SSH, LDAP,Accounts, Permissions, firewall
  • Configure Authentication, AD, Hardening, Permission, Port Blocking, Encryption, Bit Locker , Windows Firewall, SSL, Web Servers, HTTP, Cookie, Session , Authentication, 2 Factor
  • OWASP top 10 threat simulation, KALI tools, Penetration Testing, Scanning, Reconnaissance, Break Vulnerable Web App, PasswordHacking, Network Backdoors, Wireless Devices, Snooping
  • Cyber Security Tools – ArcSight, Splunk, QRadar understanding and lab sessions to practical knowledge.
  • Web application technologies – the HTTP protocol, mapping the application, attacking authentication, attacking access controls, exploiting information disclosure
  • Access controls in Microsoft windows, protecting windows against malware, windows network security, hardening windows network security, windows security administration, windows incident handling and management
  • Network filesystems, network based authentication systems, Linux firewall, securing TCP and UDP services, protecting against programmed threats, filesystems and security for users & groups, security policies and guidelines
  • Industry expert sessions once in a month during the course to understand latest cyber security trends and requirement alignment mapping.