Security Support

Almost everyone around us type at the keyboard of computers or tablets and use their smart phones daily. Computing and communications technologies have become an integral part of our life and in the context of this technology-rich environment the term “cyber space” often arises.

KLiC Security Support course is designed for young aspirants who want to shape their careers in IT Security field.

Security Support showcase image
Track
IT Hardware, Networking & Cyber Security
Level
Beginner
Language
English
Duration
120 hours
Learning Mode
Learn at ALC or at Home

Introduction

This course serves as an introduction to the exciting field of security in Information technology.

As our daily lives become more and more dependent on Internet-based tools and services, and as those platforms accumulate our sensitive data, the demand grows for experts in the field of security over the internet.

Who Should Join

  • Learners who want to understand basic concepts of computer viruses, network security, and operating system hardening.
  • Students pursuing degrees or certifications in information technology, computer science, or network engineering.
  • IT professionals who want to expand their knowledge in network administration, firewalls, routers, and VPN configuration.
  • Aspiring Cybersecurity Specialists aiming to start a career in cybersecurity or ethical hacking.
  • Computer Science or IT field students looking to explore antivirus software, intrusion detection systems (IDS), and intrusion prevention systems (IPS).
  • Learners interested in gaining hands-on experience with open-source security tools like NMAP, Kali Linux, and network packet capturing tools.

What you'll learn ?

In this course, you will get an overview of the cyber security, various types of viruses and malware, how to protect our system from viruses, types of cyber-attacks, various tools used for cyber-attacks, how to secure system from cyber-attacks.

After completing this course, you will get various Career Opportunities like:

  • Security Consultant.
  • Information Security Analyst.
  • Ethical Hackers.
  • Computer Forensics Analysts.
  • Chief Information Security Officer.
  • Penetration Tester.
  • IT Security Consultant.
  • Security Systems Administrator and so on…..

Syllabus

Removing Viruses and Malwares
  • Basics of Networking
  • Overview of Computer Viruses
  • Rootkits
  • Botnets
  • Ransomware
  • Using Antivirus Software
  • Adwares and Spywares
  • Antispam Technologies
  • Installing Free Antivirus and Scanning the PC
  • Installing Free Antispyware and scanning PC for Adware and Spywares
  • Securing Personal computers and Operating Systems
  • Patch Management
  • Patch Deployment and verification
  • Installing and configuring Open Source Firewall
  • Firewalls
  • Proxy server
  • Routers
  • Configuring Windows Firewall
  • Overview of IPS and IDS
  • Network load balancers
  • Securing Servers - Server Hardening
  • Windows Server Hardening
  • WEP, WPA and WPA2
  • MAC Address Filtering
  • Authentication and Encryption
  • Network Address Translation
  • Secure Remote Access
  • Secure Remote Access - Configuring VPN in Windows 7
  • Common Cyber Attack
  • Phishing and Spoofing attacks
  • Social Engineering
  • Man in the Middle Attack
  • Denial of Service Attack
  • Using network packet capturing tool
  • Ethical Hacking
  • Foot printing
  • Open Source Security Scanning tools like NMAP
  • Using Kali Linux for exploring various Ethical Hacking Tools

Work-Centric Approach

The academic approach of the course focuses on ‘work-centric’ education. With this hands-on approach, derive knowledge from and while working to make it more wholesome, delightful and useful. The ultimate objective is to empower learners to also engage in socially useful and productive work. It aims at bringing learners closer to their rewarding careers as well as to the development of the community.

  • Step 1: Learners are given an overview of the course and its connection to life and work
  • Step 2: Learners are exposed to the specific tool(s) used in the course through the various real-life applications of the tool(s).
  • Step 3: Learners are acquainted with the careers and the hierarchy of roles they can perform at workplaces after attaining increasing levels of mastery over the tool(s).
  • Step 4: Learners are acquainted with the architecture of the tool or tool map so as to appreciate various parts of the tool, their functions, utility and inter-relations.
  • Step 5: Learners are exposed to simple application development methodology by using the tool at the beginner’s level.
  • Step 6: Learners perform the differential skills related to the use of the tool to improve the given ready-made industry-standard outputs.
  • Step 7: Learners are engaged in appreciation of real-life case studies developed by the experts.
  • Step 8: Learners are encouraged to proceed from appreciation to imitation of the experts.
  • Step 9: After the imitation experience, they are required to improve the expert’s outputs so that they proceed from mere imitation to emulation.
  • Step 10: Emulation is taken a level further from working with differential skills towards the visualization and creation of a complete output according to the requirements provided. (Long Assignments)
  • Step 11: Understanding the requirements, communicating one’s own thoughts and presenting are important skills required in facing an interview for securing a work order/job. For instilling these skills, learners are presented with various subject-specific technical as well as HR-oriented questions and encouraged to answer them.
  • Step 12: Finally, they develop the integral skills involving optimal methods and best practices to produce useful outputs right from scratch, publish them in their ePortfolio and thereby proceed from emulation to self-expression, from self-expression to self-confidence and from self-confidence to self-reliance and self-esteem!