Data Security+ (Plus)

Introduction

It provide the student an overview of the major core areas of study they will encounter throughout this program. Introduction of computer system architectures, vulnerabilities, critical infrastructures, the growing threat of social networks, intelligence and counter intelligence, international laws, security policies, privacy and information liability, cyber attacks and counter cyber attacks, encryption, risk assessment, cybersecurity forensics including data gathering and recovery, and a forward look at future cyber technology developments.

It helps in expanding the student's knowledge and understanding of the cybersecurity challenges and issues facing corporate and governmental organizations. Courses in the certificate provide an understanding of current cybersecurity threats, phraseology and terminology, various roles, responsibilities, and processes applied in protecting an organization's digital content, as well as evaluation of transmission media, storage systems, networks, risk management and national critical infrastructure. The primary goal of this certificate program is to support IT/CS professionals seeking to expand their understanding of the cybersecurity discipline and to apply that knowledge to their profession.

Goal of Course

  • Summarize and demonstrate an understanding of the vocabulary of cybersecurity terms and phraseology.
  • Develop an understanding of the cyber threats to national critical infrastructure.
  • Demonstrate and differentiate a basic working knowledge and awareness of current and growing threats to people, organizations and society through the use of cyber war, cyber crime, encryption techniques and other activities.
  • Explain the basic knowledge of potential threats and how criminals and nation-states use different cyber techniques, the use of encryption methods and managing cyber risks.
  • Describe the roles, responsibilities and duties of computer scientists, IT managers, CIOs, CEOs and other decision makers who may influence the use of IT systems.
  • Differentiate the scope of the evolving environment of cybersecurity, international law, national law enforcement and organizational security measures and counter measures as applied to network and telecommunications operational security and applications. 

Key Modules

  • LINUX+
  • SECURITY+
  • PENTEST+
  • CYSA+

LINUX+


  • Installation and Initialization
  • Package management and Process monitoring
  • Important Files, Directories and Utilities
  • System Services, User Administration
  • File System Security and Management
  • Server configurations, Shell scripting & Kerberos Authentication
  • Advanced security & Networking concepts, Database configuration, IPv6 configuration, Kickstart configuration
  • Samba & Mail services, Virtualization

SECURITY+


  • Comparing Security Roles and Security Controls
  • Explaining Threat Actors and Threat Intelligence
  • Performing Security Assessments
  • Identifying Social Engineering and Malware
  • Summarizing Basic Cryptographic Concepts
  • Implementing Public Key Infrastructure
  • Implementing Host Security Solutions
  • Summarizing Secure Application Concepts

PENTEST+ Server


  • Footprinting and Gathering Intelligence
  • Evaluating Human and Physical Vulnerabilities
  • Preparing the Vulnerability Scan
  • Scanning and Analyzing Logical Vulnerabilities
  • Performing System Hacking
  • Scripting and Software Development
  • Leveraging the Attack: Pivot and Penetrate
  • Summarizing Report Components
  • Recommending Remediation

CYSA+


  • Utilizing Threat Data and Intelligence
  • Analyzing Security Monitoring Data
  • Collecting and Querying Security Monitoring Data
  • Utilizing Digital Forensics and Indicator Analysis Techniques
  • Applying Incident Response Procedures
  • Applying Risk Mitigation and Security Frameworks
  • Applying Security Solutions for infrastructure Management
  • Understanding Data Privacy and Protection
  • Applying Security Solutions for Software Assurance
  • Applying Security Solutions for Cloud and Automation



Note :you can speak to our team for detailed content and available batch timings.