Currently Empty: ₹0.00
Course Description
Course Content
Highlights
Course Description
Welcome to Cyber Security Analyst learning in Career Shaper.
We have curated the content to enhance your competency as a Cyber Security Analyst.
In next few weeks you will become a Job ready Cyber Security Analyst.
Prerequisite
Eligibility Criteria: Any science graduate with an understanding of the following areas:
1. Network types, models, topologies, modes of transmission, network devices and IP addressing.
2. Installation of Windows and Linux operating system, work with Linux commands, shell, filesystems.
3. Security Fundamentals
4. Network security – firewall, VPN and proxy.
5. Concept level understanding of cloud infrastructure – IaaS, PaaS, SaaS.
Learning Hours: Technical: 240 hours
Course Content
Let us understand what goes into the role of Cybersecurity analyst
Role Definition
Cyber Security Analyst
Relate to:
Network and Operating System basics
Information Security Policies and basic cryptography
Implement and manage:
Python programming
Implement and Manage the Enterprise Security
Firewall and IDPS
VPN and Wireless network security
Cloud Security
Vulnerability assessment and penetration testing
Threat intelligence and Hunting using SIEM tools
Threat incident handling and response
Comply with:
Security Standards and Governance
Access, Authorization and Authentication(AAA)
Risk Management and Compliance
Participate in:
Cyber Forensics – Investigation Process
Network, Email and Web Forensics
Advance Threat Management
Learning Hours: Technical: 240 hours
Simulated lab scenarios that you will practice
- Configuring Port Security and Access control list
- Configuration of Group Policy Objects in Windows Server
- Configuration of Windows Firewall for the initial security
- Configuring Access Control List for files & directories in Linux
- Establishing initial security of Linux Server using firewall
- Inheriting the credentials using Social Engineering Toolkit
- Demonstration of Cryptographic Algorithm workflow
- Simple HTTP Traffic analysis using Wireshark
- Performing SQL Injection attack using SQLMAP tool
Tools & Software used
IDEs: eclipse and VS Code
Webserver: Apche Tomcat
Deployment VM: AWS
Highlights
- At LSA Training, we are fostering dynamic interactions, empowering both students and faculty to engage meaningfully.
- Our approach emphasizes detailed presentations and provides soft copies of materials for easy reference.
- We prioritize practical, job-oriented training, offering hands-on experience and real-time project scenarios to develop software proficiency.
- Our test lab features cutting-edge cloud technology for convenient software practice.
- Delve into real-time project domains and stay ahead of the curve with our curated teaching methods and up-to-date curriculum.
- Join us for hands-on experience, real-time projects, and tailored training to propel your professional aspirations.
- 100% Job Placement Assistance & Interview Preparation with mock interviews and targeted questions.