Enter your keyword


Cyber Security


Course Overview

Networking Concepts Overview

  • Basics of Communication Systems
  • Transmission Media
  • ISO/OSI and TCP/IP Protocol Stacks
  • Local Area Networks
  • Wide Area Networks
  • Internetworking
  • Packet Formats
  • Wireless Networks
  • The Internet 

Information Security Concepts 

  • Information Security Overview 
  • Information Security Services 
  • Types of Attacks 
  • Goals for Security 
  • E-commerce Security 
  • Computer Forensics 
  • Steganography 
  • Security Engineering

Security Threats and vulnerabilities

  • Overview of Security threats
  • Hacking Techniques
  • Password Cracking
  • Insecure Network connections
  • Malicious Code
  • Programming Bugs
  • Cybercrime and Cyber terrorism
  • Information Warfare and Surveillance


  • Introduction to Cryptography 
  • Symmetric key Cryptography 
  • Asymmetric key Cryptography 
  • Message Authentication and Hash functions 
  • Digital Signatures 
  • Public Key infrastructure
  • Diffe-Hellman key exchange protocol 
  • Applications of Cryptography 

Security Management 

 Security Management Practices 

  • Overview of Security Management 
  • Information Classification Process 
  • Security Policy 
  • Risk Management 
  • Security Procedures and Guidelines 
  • Business Continuity and Disaster Recovery 

Security Laws and Standards 

  • Security Assurance 
  • Security Laws 
  • International Standards 
  • Security Audit 
  • OCTAVE approach 

Network Security 

Access Control and Intrusion Detection 

  • Overview of Identification and Authorization 
  • I&A Techniques 
  • Overview of IDS 
  • Intrusion Detection Systems and Intrusion Prevention Systems 

Server Management and Firewalls 

  • User Management 
  • DNS Routing and Load Balancing 
  • Overview of Firewalls 
  • Types of Firewalls 
  • DMZ and firewall features 

Security for VPN and Next Generation Networks 

  • VPN Security 
  • Security in Multimedia Networks 
  • Fax Security 
  • Link Encryption Devices 

System and Application Security 

Security Architectures and Models 

  • Designing Secure Operating Systems 
  • Controls to enforce security services 
  • Information flow model and Biba model 

System Security 

  • Desktop Security 
  • email security: PGP and SMIME 
  • Web Security: web authentication, SSL and SET 

OS Security 

  • OS Security Vulnerabilities, updates and patches 
  • OS integrity checks 
  • Anti-virus software 
  • Design of secure OS and OS hardening 
  • Configuring the OS for security
  • Trusted OS
Start On January 1, 2020
Duration 6 M
Instution PCTIL
Branch Pitampura, New Delhi

Location map

Share our course

Free Demo