
Cyber Security
- In a digital world, we are more vulnerable to malicious attacks, cyber frauds, invasions of privacy, and other such bad activities.
- This course offers detailed understanding of Cyber Security knowledge which is helpful to everyone now a day to keep safe in the online world.

Introduction
Cybersecurity i.e., Security in cyberspace is about technologies, processes, and policies that help to prevent as well as reduce the negative impact of events such as cyber-crimes and cyber terrorism in cyberspace.
- It keeps us safe from online frauds, banking frauds, hacking, etc.
- In this course the emphasis is not only about learning Cyber Security awareness but is to provide the aspirant hands-on practical knowledge
- Cyber Security course is designed for the young aspirants who want to shape their careers in the IT Security field.
Who Should Join
- Beginners or IT professionals interested in ethical hacking and penetration testing who want to learn tools like Kali Linux, Nmap, and Wireshark.
- Cybersecurity Enthusiasts interested in understanding the basics of cybersecurity, ethical hacking tools, and methods to protect data and information.
- System administrators, network engineers, and IT support personnel seeking to improve their cybersecurity knowledge and learn to secure networks, devices, and operating systems.
- General Users who want to learn about protecting their personal devices, secure their home or office networks, and prevent cyber threats.
- Individuals studying information security or related fields looking for practical exposure to cybersecurity tools and techniques.
What you'll learn ?
In this course, you will get an overview of the cyber security, various types of viruses and malware, how to protect our system from viruses, types of cyber-attacks, various tools used for cyber-attacks, how to secure system from cyber-attacks.
The course covers vividly the below given elements:
- Securing Personal Devices and Operating Systems
- Securing Wi-Fi, LAN Networks
- Tools used for Ethical Hacking
- Data and Information security
- Cyber Attacks and their Types
Software/Tools covered:
- Avast antivirus
- Comodo firewall
- Angry IP scanner
- Kali Linux OS
- Virtual box software to install Kali Linux on VM
- Nmap tool
- Wireshark tool
Objectives of the syllabus:
- To aware the learner about online frauds and best practices to keep safe
- Provide good understanding of daily life cyber security skills with examples
- Learner should able to implement security skills practically
Syllabus
The course covers vividly the below given elements:
- Securing Personal Devices and Operating Systems
- Securing Wi-Fi, LAN Networks
- Tools used for Ethical Hacking
- Data and Information security
- Cyber Attacks and their Types
- Overview of Computer Viruses
- Downloading and Installing Good Antivirus Software
- Rootkits
- Botnets
- Ransomware
- Securing Personal computers and Operating Systems
- Patch Management
- Patch Deployment and verification
- Installing and configuring Open Source Firewall
- Network Intrusion Detection and Prevention System
- Network Load Balancers
- Setting LAB environment
- VPN Configuration
- Types of Cyber Attacks
- Phishing and Spoofing attacks
- Social Engineering
- Using Network Packet Analyzers
- Ethical Hacking
- Foot printing
- Open Source Security Scanning tools like NMAP
- Using Kali Linux for exploring various Ethical Hacking Tools
Work-Centric Approach
The academic approach of the course focuses on ‘work-centric’ education. With this hands-on approach, derive knowledge from and while working to make it more wholesome, delightful and useful. The ultimate objective is to empower learners to also engage in socially useful and productive work. It aims at bringing learners closer to their rewarding careers as well as to the development of the community.
- Step 1: Learners are given an overview of the course and its connection to life and work
- Step 2: Learners are exposed to the specific tool(s) used in the course through the various real-life applications of the tool(s).
- Step 3: Learners are acquainted with the careers and the hierarchy of roles they can perform at workplaces after attaining increasing levels of mastery over the tool(s).
- Step 4: Learners are acquainted with the architecture of the tool or tool map so as to appreciate various parts of the tool, their functions, utility and inter-relations.
- Step 5: Learners are exposed to simple application development methodology by using the tool at the beginner’s level.
- Step 6: Learners perform the differential skills related to the use of the tool to improve the given ready-made industry-standard outputs.
- Step 7: Learners are engaged in appreciation of real-life case studies developed by the experts.
- Step 8: Learners are encouraged to proceed from appreciation to imitation of the experts.
- Step 9: After the imitation experience, they are required to improve the expert’s outputs so that they proceed from mere imitation to emulation.
- Step 10: Emulation is taken a level further from working with differential skills towards the visualization and creation of a complete output according to the requirements provided. (Long Assignments)
- Step 11: Understanding the requirements, communicating one’s own thoughts and presenting are important skills required in facing an interview for securing a work order/job. For instilling these skills, learners are presented with various subject-specific technical as well as HR-oriented questions and encouraged to answer them.
- Step 12: Finally, they develop the integral skills involving optimal methods and best practices to produce useful outputs right from scratch, publish them in their ePortfolio and thereby proceed from emulation to self-expression, from self-expression to self-confidence and from self-confidence to self-reliance and self-esteem!