Certified Cyber Security Analyst
Course
Online
*Indicative price
Original amount in USD:
$ 125
Description
-
Type
Course
-
Level
Intermediate
-
Methodology
Online
-
Duration
Flexible
-
Start date
Different dates available
This certification for Cyber Security Analyst assesses the candidate as per the company’s need for cyber security and forensics. The certification tests the candidates on various areas in cybercrime, IT Act 2000, cyberoffenses, wireless devices cybercrime, phishing, keyloggers, backdoors, SQL injection, DDoS attacks, identity theft, computer and wireless forensics, cyberterrorism, social media marketing, incident handling and privacy.
Facilities
Location
Start date
Start date
About this course
Job seekers looking to find employment in IT or cyber security departments of various companies, students generally wanting to improve their skill set and make their CV stronger and existing employees looking for a better role can prove their employers the value of their skills through this certification.
Reviews
Subjects
- Wireless
- Media
- Perspective
- Computing
- SQL
- Marketing
- Social Media
- Media Marketing
- Wireless Networks
- Computer Forensics
- Steganography
- Organizational Security
- Password Cracking
Teachers and trainers (1)
Name Name
Teacher
Course programme
Introduction to Cybercrime
- Definition and History
- Cybercrime and Information Security
- Who are Cybercriminals and their classification
- The Legal Perspectives
- An Indian Perspective
- Cybercrime and the Indian ITAct
- A Global Perspective on Cybercrimes
- Survival for the Netizens
- Concluding Remarks and Way Forward to Further Chapters
Cyberoffenses
- How Criminals Plan the Attacks
- Social Engineering
- Cyberstalking
- Cybercafe and Cybercrimes
- Botnets
- Attack Vector
- Cloud Computing
Cybercrime and Wireless Devices
- Proliferation of Mobile and Wireless Devices
- Trends in Mobility
- Credit Card Frauds in Mobile and Wireless Computing Era
- Security Challenges Posed by Mobile Devices
- Registry Settings for Mobile Devices
- Authentication Service Security
- Attacks on Mobile/Cell Phones
- Security Implications for Organizations
- Organizational Measures for Handling Mobile
- Organizational Security Policies and Measures in Mobile Computing Era
- Laptops
Tools and Methods Used in Cybercrime
- Proxy Servers and Anonymizers
- Phishing
- Password Cracking
- Keyloggers and Spywares
- Virus and Worms
- Trojan Horses and Backdoors
- Steganography
- DoS and DDoS Attacks
- SQL Injection
- Buffer Overflow
- Attacks on Wireless Networks
Phishing and Identity Theft
- Phishing
- Identity Theft (ID Theft)
The Legal Perspectives
- Cybercrime and the Legal Landscape around the World
- Cyberlaws in India
- The Indian IT Act
- Challenges to Indian Law and Cybercrime Scenario in India
- Consequences of Not Addressing the Weakness in Information Technology Act
- Digital Signatures and the Indian IT Act
- Amendments to the Indian IT Act
- Cybercrime and Punishment
Computer Forensics
- Historical Background of Cyberforensics
- Digital Forensics Science
- The Need for Computer Forensics
- Cyberforensics and Digital Evidence
- Forensics Analysis of E-Mail
- Digital Forensics Life Cycle
- Chain of Custody Concept
- Network Forensics
- Approaching a Computer Forensics Investigation
- Setting up a Computer Forensics Laboratory
- Computer Forensics and Steganography
- Relevance of the OSI Layer Model to Computer Forensics
- Forensics and Social Networking Sites
- Computer Forensics from Compliance Perspective
- Challenges in Computer Forensics
- Special Tools and Techniques
- Forensics Auditing
- Antiforensics
Forensics of Hand-Held Devices
- Understanding Cell Phone Working Characteristics
- Hand-Held Devices and Digital Forensics
- Toolkits for Hand-Held Device Forensics
- Forensics of iPods and Digital Music Devices
- An Illustration on Real Life Use of Forensics
- Techno-Legal Challenges with Evidence from Hand-Held Devices
- Organizational Guidelines on Cell Phone Forensics
Cybersecurity and Organizations
- Cost of Cybercrimes and IPR Issues
- Web Threats for Organizations
- Security and Privacy Implications from Cloud Computing
- Social Media Marketing
- Social Computing and the Associated Challenges for Organizations
- Protecting People’s Privacy in the Organization
- Organizational Guidelines for Internet Usage
- Safe Computing Guidelines and Computer Usage Policy
- Incident Handling
- Forensics Best Practices for Organizations
- Media and Asset Protection
- Importance of Endpoint Security in Organizations
Cybercrime and Cyberterrorism
- Intellectual Property in the Cyberspace
- The Ethical Dimension of Cybercrimes
- The Psychology, Mindset and Skills of Hackers and Other Cybercriminals
- Sociology of Cybercriminals
- Information Warfare
Cybercrime Case Study
- Real-Life Examples
- Mini-Cases
- Illustrations of Financial Frauds in Cyber Domain
- Digital Signature-Related Crime Scenarios
- Digital Forensics Case Illustrations
- Online Scams
Additional information
Certified Cyber Security Analyst
*Indicative price
Original amount in USD:
$ 125