Nothing Special   »   [go: up one dir, main page]

Syllabus For Qip in Cyber Security

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

SYLLABUS FOR QIP in CYBER SECURITY

DOMAINS OF CYBER SECURITY


Critical infrastructure security - practices for protecting the computer systems, networks,
and other assets that society relies upon for national security, economic health, and/or public
safety.

Network security - security measures for protecting a computer network from intruders,
including both wired and wireless (Wi-Fi) connections.

Application security - processes that help protect applications operating on-premises and
in the cloud. Security should be built into applications at the design stage, with
considerations for how data is handled, user authentication, etc.

Cloud security - specifically, true confidential computing that encrypts cloud data at rest (in
storage), in motion (as it travels to, from and within the cloud) and in use (during processing)
to support customer privacy, business requirements and regulatory compliance standards.

Information security - data protection measures, such as the General Data Protection
Regulation or GDPR, that secure your most sensitive data from unauthorized access,
exposure, or theft.

End-user education - building security awareness across the organization to strengthen


endpoint security. For example, users can be trained to delete suspicious email attachments,
avoid using unknown USB devices, etc.

Disaster recovery / business continuity planning - tools and procedures for responding
to unplanned events, such as natural disasters, power outages, or cybersecurity incidents,
with minimal disruption to key operations.

Storage security - rock solid data resilience with numerous safeguards. This includes
encryption and immutable and isolated data copies. These remain in the same pool so they
can quickly be restored to support recovery, minimizing the impact of a cyber attack.

OBJECTIVES OF THE PROGRAM


By the end of the program, the faculty will be able to perform the following:

● Demonstrate proficiency with cybersecurity concepts


● Install, configure and deploy public key infrastructure and network components while
assessing and troubleshooting issues to support organizational security
● Master advanced hacking concepts to manage information security efficiently
● Design security architecture and framework for a secure IT operation
● Frame cloud data storage architectures and security strategies, and utilize them to
analyze risks
● Protect data movement, perform disaster recovery, access CSP security and manage
client databases
● Implement technical strategies, tools, and techniques to secure data and information
for your organization
● Adhere to ethical security behavior for risk analysis and mitigation
● Understand security in cloud computing architecture in depth

TOOLS AND SOFTWARE


- Kali Linux

A Application Security Solution Burpsuite Professional

Nessus Professional - Nessus


B Professional-Vulnerability
Audit and Assessment Solution Management-On-Premise(NEW)

C Application Audit Solution Acunetix - OnPrem Premium

EM-Analyzer
E IDA Pro
Malware Forensics HP Server DL 180

F Incident Response Solution AD Enterprise

M Computer Forensic Tool FTK

You might also like