NCSSS

NCSSS

NCDRC

Online Courses

How to join online course?

Certificate in Information Security

2 months Course (INR 20,000 + 18% GST)


COURSE MODULE

1. INTRODUCTION TO INFORMATION SECURITY
• Introduction To Information Security • Security And Hacking • Data & Information • Operating Systems • DBMS • SQL • Data Communication • Computer Networking • OSI Modal • Protocols • Networking Devices • Basic Threats • Types Of Hacking • Information Security Policies • Cyber Crime • Challenges In Securing The Cyber Crime • Phishing • Spyware • IPV6 • Smart Cards
2.DATA SECURITY
• Data Security • Data Security Management • Characteristics Of Access Security In The System • Types Of Database Attack • Data Security Issues And Solutions • Introduction To Cloud Computing • Cloud Computing And Data Protection • Open Issues On Data Protection • Data Backup • Offline Backup • Online Backup • Cryptography • Strength Of Cryptography • Goals Of Cryptography • Types Of Cipher Text • DES, RC5,AES, IDEA • Types Of Crytography • Hash Function • Digital Signature • Steganography • Image And Audio Steganography • Physical Security • Biometric Security
3.NETWORK SECURITY
• Network Security • Virtual Private Network Security • VPN Types & VPN Models • Security Threats Of VPN • Wireless LAN • Standards Of Wireless LAN • WLAN Antennas • Types Of Wireless • Rouge Access Point • Service Set Identifier (SSID) • Wire Equivalent Privacy (WEP) • Wireless Intrusion Prevention • Router Security • Understating The Protocols • Handshake Protocols • Network Address Translation • Intrusion Detection And Prevention System • IDS Vs IPS • Access Control System • Need Of Access Control System • Types Of Access Control System
4.DESKTOP AND SERVER SECURITY
• Introduction • Types Of Operating System • Windows Firewall • Rights And Privileges • Registry • Client – Server Architecture • Server Security Principles • Windows Introduction And Security • Linux Security


Apply Online Apply Offline

Certificate in Cyber Security

3 months Course (INR 35,000 + 18% GST)


COURSE MODULE

1. INTRODUCTION TO INFORMATION SECURITY
• Introduction To Information Security • Security And Hacking • Data & Information • Operating Systems • DBMS • SQL • Data Communication • Computer Networking • OSI Modal • Protocols • Networking Devices • Basic Threats • Types Of Hacking • Information Security Policies • Cyber Crime • Challenges In Securing The Cyber Crime • Phishing • Spyware • IPV6 • Smart Cards
2.DATA SECURITY
• Data Security • Data Security Management • Characteristics Of Access Security In The System • Types Of Database Attack • Data Security Issues And Solutions • Introduction To Cloud Computing • Cloud Computing And Data Protection • Open Issues On Data Protection • Data Backup • Offline Backup • Online Backup • Cryptography • Strength Of Cryptography • Goals Of Cryptography • Types Of Cipher Text • DES, RC5,AES, IDEA • Types Of Crytography • Hash Function • Digital Signature • Steganography • Image And Audio Steganography • Physical Security • Biometric Security
3.NETWORK SECURITY
• Network Security • Virtual Private Network Security • VPN Types & VPN Models • Security Threats Of VPN • Wireless LAN • Standards Of Wireless LAN • WLAN Antennas • Types Of Wireless • Rouge Access Point • Service Set Identifier (SSID) • Wire Equivalent Privacy (WEP) • Wireless Intrusion Prevention • Router Security • Understating The Protocols • Handshake Protocols • Network Address Translation • Intrusion Detection And Prevention System • IDS Vs IPS • Access Control System • Need Of Access Control System • Types Of Access Control System
4.DESKTOP AND SERVER SECURITY
• Introduction • Types Of Operating System • Windows Firewall • Rights And Privileges • Registry • Client – Server Architecture • Server Security Principles • Windows Introduction And Security • Linux Security
5.WEB SECURITY
Lan Security • The Initial Internetting Concepts • Introduction To Lan • Why Lan Security Is Important • Lan/Wan Components • Topology • Protocols • Threats Of Lan • Inappropriate Access To Lan Resources • Disclosure Of Data • Unauthorized Modification Of Data And Software • Disclosure Of Lan Traffic • Spoofing Of Lan Traffic • Disruption Of Lan Functions • Security Services And Mechanisms • Protecting Mac Address • Network Scanners • Types Of Scanning • Scanning Methodology
Firewall Security • Firewalls • Working Of Firewall • Types Of Firewall • Firewall Monitoring • Proxy Server • Use Of Proxy • Working Of Proxy Server • Applications Of Firewall • Firewall Evasion Tool
Internet Security • Introduction • Security Intrusions And Security Properties • Threats Faced On Internet • Types Of Internet Security • Introduction To Ip Addresses • Finding Ip Address Of A Remote System • Hiding Your Identity: Anonymous Surfing • What Is A Socks Proxy Server?
E-Mail Security • Introduction • History Of E-Mail • Email Addresses • How E-Mail Works? • Various Mail Servers • E-Mail Protocols • Analysis Of Email Headers • Email Tracking • Ip Tracking Using Email • Spamming • Ways To Prevent Spam • Security Threats To Your Email Communications • Setup Email Filter In Gmail, Hotmail & Yahoo • How To Steal Data From An E-Mail? • E-Mail Exchange Server Security • Virus Protection • Rpc Over Http • Protecting Front-End Servers • Keep Exchange Server Up-To-Date • Cyber Laws Regarding Spamming • Security Policies
6.PROTECTION FROM HACKING ATTACKS
Malwares • Introduction To Malwares • Types Of Malwares • Infectious Malware • Vulnerability To Malware • Anti-Malware Strategies • Installing Bots On Target Machines • Attacking Methods • Working Of Bots • Malware Detection Techniques • Counter Measures Network Intrusion • Introduction • Types Of Intrusions • Non-Technical Intrusions • Tabnabbing • Technical Intrusions • Password Intrusion • Backtrack • Backdoor • Backdoor Countermeasures • Rootkits • Monitoring Tools • Malware Glossary
Art Of Googling • Introduction • The Google Toolbar • Searching Techniques • Directory Listing • Locating Cgi-Bin • Locating Robots.Txt • Camera Intrusion • Some Tricks • The Harvester Tool Articles
7.Communication Security
Mobile Security • Introduction • What Is Mobile? • Architecture Of Mobile Communication • Mobile Generation • Technology Of Mobile Communication • Mobile Phone Standards • Protocols Used In Mobile • Introduction To Sms Messaging • Sim • Introduction To Mobile Os • Popular Operating Systems • Android From Google Inc. • Blackberry Os From Rim • Ios From Apple Inc • Symbian Os (Latest Release Nokia Belle Feature Pack 2 • Windows Phone Os • Samsung Bada • What Is Nfc, How It Works And What Are Its Practical Applications • Why Is Mobile Security Important? • Mobile Platform Comparison • Mobile Threats • Trends Of Mobile Threats • What Is Bluetooth? & How Does It Work?? • How Bluetooth Creates A Connection • Bluetooth Intrusions On Mobile Phones • Bluetooth Weaknesses • Mobile Safeguards And Solutions • Android • Blackberry • Iphone • Symbaian • Windows Phone • Samsung Bada
Unit 2: Voice Over Internet Protocol • Definition & Trends • Services • Types Of Voip • Components Of Voip • Ip Telephony &Ip Paging • Protocols And Acronyms • Reasons For Voip • Problems In Voip • Voip Security Scenario • How Do We Secure Voip? • Types Of Voip Encryption And Authentication
E-Mail Security • Introduction • History Of E-Mail • Email Addresses • How E-Mail Works? • Various Mail Servers • E-Mail Protocols • Analysis Of Email Headers • Email Tracking • Ip Tracking Using Email • Spamming • Ways To Prevent Spam • Security Threats To Your Email Communications(Recent Updates) • Setup Email Filter In Gmail, Hotmail & Yahoo • How To Steal Data From An E-Mail? • E-Mail Exchange Server Security • Virus Protection • Rpc Over Http • Protecting Front-End Servers • Keep Exchange Server Up-To-Date • Cyber Laws Regarding Spamming • Security Policies(Recent Updates)


Apply Online Apply Offline

Diploma In Cyber Security

6 months Course (INR 50,000 + 18% GST)


COURSE MODULE

1. INTRODUCTION TO INFORMATION SECURITY
• Introduction To Information Security • Security And Hacking • Data & Information • Operating Systems • DBMS • SQL • Data Communication • Computer Networking • OSI Modal • Protocols • Networking Devices • Basic Threats • Types Of Hacking • Information Security Policies • Cyber Crime • Challenges In Securing The Cyber Crime • Phishing • Spyware • IPV6 • Smart Cards
2.DATA SECURITY
• Data Security • Data Security Management • Characteristics Of Access Security In The System • Types Of Database Attack • Data Security Issues And Solutions • Introduction To Cloud Computing • Cloud Computing And Data Protection • Open Issues On Data Protection • Data Backup • Offline Backup • Online Backup • Cryptography • Strength Of Cryptography • Goals Of Cryptography • Types Of Cipher Text • DES, RC5,AES, IDEA • Types Of Crytography • Hash Function • Digital Signature • Steganography • Image And Audio Steganography • Physical Security • Biometric Security
3.NETWORK SECURITY
• Network Security • Virtual Private Network Security • VPN Types & VPN Models • Security Threats Of VPN • Wireless LAN • Standards Of Wireless LAN • WLAN Antennas • Types Of Wireless • Rouge Access Point • Service Set Identifier (SSID) • Wire Equivalent Privacy (WEP) • Wireless Intrusion Prevention • Router Security • Understating The Protocols • Handshake Protocols • Network Address Translation • Intrusion Detection And Prevention System • IDS Vs IPS • Access Control System • Need Of Access Control System • Types Of Access Control System
4.DESKTOP AND SERVER SECURITY
• Introduction • Types Of Operating System • Windows Firewall • Rights And Privileges • Registry • Client – Server Architecture • Server Security Principles • Windows Introduction And Security • Linux Security
5.WEB SECURITY
Lan Security • The Initial Internetting Concepts • Introduction To Lan • Why Lan Security Is Important • Lan/Wan Components • Topology • Protocols • Threats Of Lan • Inappropriate Access To Lan Resources • Disclosure Of Data • Unauthorized Modification Of Data And Software • Disclosure Of Lan Traffic • Spoofing Of Lan Traffic • Disruption Of Lan Functions • Security Services And Mechanisms • Protecting Mac Address • Network Scanners • Types Of Scanning • Scanning Methodology
Firewall Security • Firewalls • Working Of Firewall • Types Of Firewall • Firewall Monitoring • Proxy Server • Use Of Proxy • Working Of Proxy Server • Applications Of Firewall • Firewall Evasion Tool
Internet Security • Introduction • Security Intrusions And Security Properties • Threats Faced On Internet • Types Of Internet Security • Introduction To Ip Addresses • Finding Ip Address Of A Remote System • Hiding Your Identity: Anonymous Surfing • What Is A Socks Proxy Server?
E-Mail Security
• Introduction • History Of E-Mail • Email Addresses • How E-Mail Works? • Various Mail Servers • E-Mail Protocols • Analysis Of Email Headers • Email Tracking • IP Tracking Using Email • Spamming • Ways To Prevent Spam • Security Threats To Your Email Communications • Setup Email Filter In Gmail, Hotmail & Yahoo • How To Steal Data From An E-Mail? • E-Mail Exchange Server Security • Virus Protection • Rpc Over Http • Protecting Front-End Servers • Keep Exchange Server Up-To-Date • Cyber Laws Regarding Spamming • Security Policies
6.PROTECTION FROM HACKING ATTACKS
Malwares • Introduction To Malwares • Types Of Malwares • Infectious Malware • Vulnerability To Malware • Anti-Malware Strategies • Installing Bots On Target Machines • Attacking Methods • Working Of Bots • Malware Detection Techniques • Counter Measures
Network Intrusion • Introduction • Types Of Intrusions • Non-Technical Intrusions • Tabnabbing • Technical Intrusions • Password Intrusion • Backtrack • Backdoor • Backdoor Countermeasures • Rootkits • Monitoring Tools • Malware Glossary
Art Of Googling • Introduction • The Google Toolbar • Searching Techniques • Directory Listing • Locating Cgi-Bin • Locating Robots.Txt • Camera Intrusion • Some Tricks • The Harvester Tool Articles
7.Communication Security
Mobile Security • Introduction • What Is Mobile? • Architecture Of Mobile Communication • Mobile Generation • Technology Of Mobile Communication • Mobile Phone Standards • Protocols Used In Mobile • Introduction To SMS Messaging • Sim • Introduction To Mobile Os • Popular Operating Systems • Android From Google Inc. • Blackberry Os From Rim • IOS from Apple Inc • Symbian OS • Windows Phone Os • Samsung Bada • What Is Nfc, How It Works And What Are Its Practical Applications • Why Is Mobile Security Important? • Mobile Platform Comparison • Mobile Threats • Trends Of Mobile Threats • What Is Bluetooth? & How Does It Work?? • How Bluetooth Creates A Connection • Bluetooth Intrusions On Mobile Phones • Bluetooth Weaknesses • Mobile Safeguards And Solutions • Android • Blackberry • Iphone • Symbaian • Windows Phone • Samsung Bada
Voice Over Internet Protocol • Definition & Trends • Services • Types Of Voip • Components Of Voip • Ip Telephony &Ip Paging • Protocols And Acronyms • Reasons For Voip • Problems In Voip • Voip Security Scenario • How Do We Secure Voip? • Types Of Voip Encryption And Authentication
E-Mail Security • Introduction • History Of E-Mail • Email Addresses • How E-Mail Works? • Various Mail Servers • E-Mail Protocols • Analysis Of Email Headers • Email Tracking • Ip Tracking Using Email • Spamming • Ways To Prevent Spam • Security Threats To Your Email Communications(Recent Updates) • Setup Email Filter In Gmail, Hotmail & Yahoo • How To Steal Data From An E-Mail? • E-Mail Exchange Server Security • Virus Protection • Rpc Over Http • Protecting Front-End Servers • Keep Exchange Server Up-To-Date • Cyber Laws Regarding Spamming • Security Policies(Recent Updates)
8.VAPT
Introduction To VAPT • Introduction • Important Technical Terms • Information Gathering • Scanning And Fingerprinting
Vulnerability Assessment • Vulnerabilities • Vulnerability Assessment • Protective Measures • Step Wise Approach • Vulnerability Assessment: The Right Tools To Protect Your Critical Data • Types Of Vulnerability Assessment • The Challenges Of Vulnerability Assessments • Tools For Va • Risk Assessment • Network Security Audit Case Study
Penetration Testing • Introduction And Methodology • Types Of Penetration Tests • Methodology • Penetration Testing Approach • Penetration Testing Vs Vulnerability Assessment • How Vulnerabilities Are Identified • A Sample Penetration Testing Report • Security Services • Security Services Management Tools • Firewall • Automated Vulnerability Scanning • An Approach To Vulnerability Scanning • Password Cracking And Brute Forcing • Denial Of Service (Dos) Testing • Wireless Penetration Testing • Penetration Testing Tools • Escalation Of Privileges • Case Studies
9.Cyber Forensics
Cyber Crime • Cyber Security & Forensics • What Is Cyber Crimes? • Classification Of Cyber Crime • Why Learn About Cyber Crime • Types Of Cyber Crime • Characteristics Of Computer Crime • Prevention Of Cyber Crime • Questionnaire Based On Recommendations From The Fourth Meeting Of Governmental Experts On Cyber-Crime Cyber Criminals • Case Studies
Cyber Forensics • Cyber Forensics: Detailed View • Digital Evidence • Challenges Of Forensic Science • Forensic Methodology • Some Forensic Softwares/ Hardwares • Basic Approaches • Forensics Tools Example
Catching Criminals • Cyber Terrorism- The Dark Side Of The Web World • Honey Pots(Honey Nets)
Mobile Forensics • Introduction To Mobile Forensics • General Phones (Nokia, Samsung, Lg) • Blackberry Devices • Chinese Devices • Android Phones • Extraction Methods Of Mobile Forensics • Mobile Phone Characteristics • Mobile Forensic Analysis • The Challenges Of Mobile Forensics • Tools For Mobile Forensics • Forensic Toolkit
10.Information Security Management System
Security Auditing • Introduction • Security Auditing Objectives • Risk Involved • Auditing Steps • Audited Processes • Audited Systems • Auditing Application Security
Lead Auditor: It (La-27001 • Introduction • Purpose Of Standards • Controls & Its Objectives • Iso/Iec 27001 Auditor: Auditor’s Roles And Responsibilities • Review Of The Iso 27001:2005 • Understanding Of The Relations Between Iso 27001:2005and Iso/Iec 17799:2005 • Security Related Threat And Vulnerabilities Evaluation • Understanding Of The Security Controls And Countermeasures
11.Cyber Laws And It Acts
• Introduction • Cyber Laws: International Perspective • E-Governance • Impediments In Implementing E-Governance Projects From Legal Perspective • Analysis Of Problems – Repercussions • Relevant Laws • Jurisprudence Of Indian Cyber Law • The Information Technology Act, 2000 (Some Laws) • Amendment To The It Act 2000 By Itaa2008 • Advantages Of Cyber Laws • Prosecution Of Cyber Crimes Under Indian Cyber Laws (It Act, 2000) • Probable Solutions • Articles On Cyber Laws • Cases On Cyber Laws


Apply Online Apply Offline

Post Graduate Diploma In Cyber Security

9 months Course (INR 70,000 + 18% GST)


COURSE MODULE

1. INTRODUCTION TO INFORMATION SECURITY
• Introduction To Information Security • Security And Hacking • Data & Information • Operating Systems • DBMS • SQL • Data Communication • Computer Networking • OSI Modal • Protocols • Networking Devices • Basic Threats • Types Of Hacking • Information Security Policies • Cyber Crime • Challenges In Securing The Cyber Crime • Phishing • Spyware • IPV6 • Smart Cards
2. DATA SECURITY
• Data Security • Data Security Management • Characteristics Of Access Security In The System • Types Of Database Attack • Data Security Issues And Solutions • Introduction To Cloud Computing • Cloud Computing And Data Protection • Open Issues On Data Protection • Data Backup • Offline Backup • Online Backup • Cryptography • Strength Of Cryptography • Goals Of Cryptography • Types Of Cipher Text • DES, RC5,AES, IDEA • Types Of Crytography • Hash Function • Digital Signature • Steganography • Image And Audio Steganography • Physical Security • Biometric Security
3. NETWORK SECURITY
• Network Security • Virtual Private Network Security • VPN Types & VPN Models • Security Threats Of VPN • Wireless LAN • Standards Of Wireless LAN • WLAN Antennas • Types Of Wireless • Rouge Access Point • Service Set Identifier (SSID) • Wire Equivalent Privacy (WEP) • Wireless Intrusion Prevention • Router Security • Understating The Protocols • Handshake Protocols • Network Address Translation • Intrusion Detection And Prevention System • IDS Vs IPS • Access Control System • Need Of Access Control System • Types Of Access Control System
4. DESKTOP AND SERVER SECURITY
• Introduction • Types Of Operating System • Windows Firewall • Rights And Privileges • Registry • Client – Server Architecture • Server Security Principles • Windows Introduction And Security • Linux Security
5. WEB SECURITY
Lan Security • The Initial Internetting Concepts • Introduction To Lan • Why Lan Security Is Important • Lan/Wan Components • Topology • Protocols • Threats Of Lan • Inappropriate Access To Lan Resources • Disclosure Of Data • Unauthorized Modification Of Data And Software • Disclosure Of Lan Traffic • Spoofing Of Lan Traffic • Disruption Of Lan Functions • Security Services And Mechanisms • Protecting Mac Address • Network Scanners • Types Of Scanning • Scanning Methodology
Firewall Security • Firewalls • Working Of Firewall • Types Of Firewall • Firewall Monitoring • Proxy Server • Use Of Proxy • Working Of Proxy Server • Applications Of Firewall • Firewall Evasion Tool
Internet Security • Introduction • Security Intrusions And Security Properties • Threats Faced On Internet • Types Of Internet Security • Introduction To Ip Addresses • Finding Ip Address Of A Remote System • Hiding Your Identity: Anonymous Surfing • What Is A Socks Proxy Server?
E-Mail Security • Introduction • History Of E-Mail • Email Addresses • How E-Mail Works? • Various Mail Servers • E-Mail Protocols • Analysis Of Email Headers • Email Tracking • Ip Tracking Using Email • Spamming • Ways To Prevent Spam • Security Threats To Your Email Communications • Setup Email Filter In Gmail, Hotmail & Yahoo • How To Steal Data From An E-Mail? • E-Mail Exchange Server Security • Virus Protection • Rpc Over Http • Protecting Front-End Servers • Keep Exchange Server Up-To-Date • Cyber Laws Regarding Spamming • Security Policies
6. PROTECTION FROM HACKING ATTACKS
Malwares • Introduction To Malwares • Types Of Malwares • Infectious Malware • Vulnerability To Malware • Anti-Malware Strategies • Installing Bots On Target Machines • Attacking Methods • Working Of Bots • Malware Detection Techniques • Counter Measures
Network Intrusion • Introduction • Types Of Intrusions • Non-Technical Intrusions • Tabnabbing • Technical Intrusions • Password Intrusion • Backtrack • Backdoor • Backdoor Countermeasures • Rootkits • Monitoring Tools • Malware Glossary
Art Of Googling • Introduction • The Google Toolbar • Searching Techniques • Directory Listing • Locating Cgi-Bin • Locating Robots.Txt • Camera Intrusion • Some Tricks • The Harvester Tool Articles
7. Communication Security
Mobile Security • Introduction • What Is Mobile? • Architecture Of Mobile Communication • Mobile Generation • Technology Of Mobile Communication • Mobile Phone Standards • Protocols Used In Mobile • Introduction To Sms Messaging • Sim • Introduction To Mobile Os • Popular Operating Systems • Android From Google Inc. • Blackberry Os From Rim • Ios From Apple Inc • Symbian Os • Windows Phone Os • Samsung Bada • What Is Nfc, How It Works And What Are Its Practical Applications • Why Is Mobile Security Important? • Mobile Platform Comparison • Mobile Threats • Trends Of Mobile Threats • What Is Bluetooth? & How Does It Work?? • How Bluetooth Creates A Connection • Bluetooth Intrusions On Mobile Phones • Bluetooth Weaknesses • Mobile Safeguards And Solutions • Android • Blackberry • Iphone • Symbaian • Windows Phone • Samsung Bada
Voice Over Internet Protocol • Definition & Trends • Services • Types Of Voip • Components Of Voip • Ip Telephony & Ip Paging • Protocols And Acronyms • Reasons For Voip • Problems In Voip • Voip Security Scenario • How Do We Secure Voip? • Types Of Voip Encryption And Authentication
E-Mail Security • Introduction • History Of E-Mail • Email Addresses • How E-Mail Works? • Various Mail Servers • E-Mail Protocols • Analysis Of Email Headers • Email Tracking • Ip Tracking Using Email • Spamming • Ways To Prevent Spam • Security Threats To Your Email Communications(Recent Updates) • Setup Email Filter In Gmail, Hotmail & Yahoo • How To Steal Data From An E-Mail? • E-Mail Exchange Server Security • Virus Protection • Rpc Over Http • Protecting Front-End Servers • Keep Exchange Server Up-To-Date • Cyber Laws Regarding Spamming • Security Policies(Recent Updates)
8. VAPT
Introduction To Vapt • Introduction • Important Technical Terms • Information Gathering • Scanning And Fingerprinting
Vulnerability Assessment • Vulnerabilities • Vulnerability Assessment • Protective Measures • Step Wise Approach • Vulnerability Assessment: The Right Tools To Protect Your Critical Data • Types Of Vulnerability Assessment • The Challenges Of Vulnerability Assessments • Tools For Va • Risk Assessment • Network Security Audit Case Study
Penetration Testing • Introduction And Methodology • Types Of Penetration Tests • Methodology • Penetration Testing Approach • Penetration Testing Vs Vulnerability Assessment • How Vulnerabilities Are Identified • A Sample Penetration Testing Report • Security Services • Security Services Management Tools • Firewall • Automated Vulnerability Scanning • An Approach To Vulnerability Scanning • Password Cracking And Brute Forcing • Denial Of Service (Dos) Testing • Wireless Penetration Testing • Penetration Testing Tools • Escalation Of Privileges • Case Studies
9. Cyber Forensics
Cyber Crime • Cyber Security & Forensics • What Is Cyber Crimes? • Classification Of Cyber Crime • Why Learn About Cyber Crime • Types Of Cyber Crime • Characteristics Of Computer Crime • Prevention Of Cyber Crime • Questionnaire Based On Recommendations From The Fourth Meeting Of Governmental Experts On Cyber-Crime Cyber Criminals • Case Studies
Cyber Forensics • Cyber Forensics: Detailed View • Digital Evidence • Challenges Of Forensic Science • Forensic Methodology • Some Forensic Softwares/ Hardwares • Basic Approaches • Forensics Tools Example
Catching Criminals • Cyber Terrorism- The Dark Side Of The Web World • Honey Pots(Honey Nets)
Mobile Forensics • Introduction To Mobile Forensics • General Phones (Nokia, Samsung, Lg) • Blackberry Devices • Chinese Devices • Android Phones • Extraction Methods Of Mobile Forensics • Mobile Phone Characteristics • Mobile Forensic Analysis • The Challenges Of Mobile Forensics • Tools For Mobile Forensics • Forensic Toolkit
10. Information Security Management System
Security Auditing • Introduction • Security Auditing Objectives • Risk Involved • Auditing Steps • Audited Processes • Audited Systems • Auditing Application Security
Lead Auditor: It (La-27001 • Introduction • Purpose Of Standards • Controls & Its Objectives • Iso/Iec 27001 Auditor: Auditor’s Roles And Responsibilities • Review Of The Iso 27001:2005 • Understanding Of The Relations Between Iso 27001:2005and Iso/Iec 17799:2005 • Security Related Threat And Vulnerabilities Evaluation • Understanding Of The Security Controls And Countermeasures
11. Cyber Laws And It Acts
• Introduction • Cyber Laws: International Perspective • E-Governance • Impediments In Implementing E-Governance Projects From Legal Perspective • Analysis Of Problems – Repercussions • Relevant Laws • Jurisprudence Of Indian Cyber Law • The Information Technology Act, 2000 (Some Laws) • Amendment To The It Act 2000 By Itaa2008 • Advantages Of Cyber Laws • Prosecution Of Cyber Crimes Under Indian Cyber Laws (It Act, 2000) • Probable Solutions • Articles On Cyber Laws • Cases On Cyber Laws
12. IDS/IPS
Introduction IDS • Introduction to Snort • Network Traffic Analysis using tcpdump and Wireshark • TCP/IP Fundamental • Know your Enemy: How the bad guys attempt to penetrate your network • Difference between HIDS & NIDS • Installing, configuring SNORT • Configuration file • Upgrading • Sensor placement • Logging • Packet capture and analysis • Preprocessors
Rule writing • Dynamic rules • Testing rules • Optimizing rules • Statistical analysis
Management tools • Barnyard • Snort console • ACID • Performance Tuning and thresholding • Turning snort into an IPS • Logging and Analysis • Log and Alert analysis • Data Analysis Tools • Installing and Using Barnyard
Security Onion • Introduction to security onion • Configuring Security onion • Sensor Setup • Configuring SGUIL server • Configuring Snorby
13. Cryptography
Introduction to Cryptography • Probability Space • Caesar Cipher • Polyalphabetic Cipher • One-time Pad • Frequency Stability • WW2 Enigma Machine • Claude Shannon's Perfect Secrecy • Random vs. Pseudorandom Number Generators
The Fundamental Theorem of Arithmetic • Diffie-Hellman Key Exchange - Part 1 • Discrete Logarithm Problem • Diffie-Hellman Key Exchange - Part 2 • Introduction to RSA Encryption • RSA Encryption - Part 2 • RSA Encryption - Part 3 • Euler's Totient Phi Function • RSA Encryption - Part 4
14. IoT Security
• Introduction • What Is loT? • Security Role in the loT Development
loT Security and loT Architectures • loT Architectures • loT Components • loT Architectures and loT Security
loT Security Challenges • loT Security Risks and Challenges • loT Security Threats and Attacks • Attack Categorization for loT Process Phases • Attack Categorization According to loT Architecture • Security Threats at the Sensing/Perception Layer • Security Threats at the Network and Service Support Layers
loT Security Requirements
Trust, Data Confidentiality, and Privacy in loT • Trust in loT • Trust and Security from a Device Perspective • Trust and Secure Key Storage • Identity Management • Data Confidentiality in loT • Privacy in loT
Security in loT Networks • loT Communication Technologies • RFID Security • Security in NFC
loT Security in Public Cloud • Security Features of loT Cloud Solutions • loT Security in Azure • loT Security in AWS • loT Security in Google Cloud Platform
Security in the Future loT Systems • Main Trends in the Next Generation loT Security • Next Generation loT Security: Data Confidentiality • Homomorphic Encryption • Searchable Encryption • Next Generation loT Security: Trust • Trust Establishment • Blockchain and loT: Trust in Transactions • Next Generation loT Security: Privacy • Privacy Through Data Usage Control
15. Python
Introduction • What is Python • Starting with Python • Installation of Environment • Interaction with Python
Python for Security assessments • Object in Python • Conditionals • Loops • Regular Expressions • Exceptions, Errors • Functions • !/usr/bin/python3 • Classes • File Input, Output • Containers • Module • Debugging
Python for Security Analysis, Scanner & Reconnaissance • Socket and Networking • Importing Nmap Module • Nmap Network Scanner • TLD Scanner • Get IP Address • Whois Search • NMAP Port Scan • Robots Exclusion


Apply Online Apply Offline

Online Courses Fee:

  • Certificate in Information Security (Two Months Course) - processing Fee : INR 20,000 /- (Twenty Thousand) + 18% GST

  • Certificate in Cyber Security (Three Months Course) - processing Fee : INR 35,000 /- (Twenty Five Thousand) + 18% GST

  • Diploma In Cyber Security (Six Months Course) - processing Fee : INR 50,000 /- (Fifty Thousand) + 18% GST

  • Post Graduate Diploma In Cyber Security (Nine Months Course) - processing Fee : INR 70,000 /- (Seventy Thousand) + 18% GST

  • Note: Offline Payments are accepted through Cheque/Demand Draft and the Cheque/Demand Draft should be drawn in favour of “NATIONAL CYBER SAFETY AND SECURITY STANDARDS”.

    Contact

  • Phone : +91 7904694229 / 9946490900
  • Email : info.onlinecourse@ncdrc.res.in