Cyber Security
FEE
35,000
25,000/- +GST
JUN-15
09:00 - 01:00
Online
Weekends

Applied Cyber Security – Cloud Security

Become an expert in Cyber Security

This cybersecurity course covers network security, cryptography, application security, identity and access management, risk management, and incident response. It teaches secure network design, encryption methods, secure coding, and managing identities, along with risk assessment and incident handling.

Prerequisites

  1. Understand how to use Operating Systems like Windows, Linux, or macOS.
  2. Familiarity with File Management, using a command-line interface and installing/uninstalling software.

  1. Gain proficiency in at least one Programming Language (eg.: Python, JavaScript or Bash).
  2. Understand programming concepts such as variables, loops, conditionals, functions and data structures.

  1. Learn about TCP/IP Protocols, OSI Model, IP Addressing, Subnetting and Basic Network Troubleshooting.
  2. Understand concepts like DNS, DHCP, HTTP/HTTPS, FTP, SSH and VLANs.

  1. Learn about TCP/IP Protocols, OSI Model, IP Addressing, Subnetting and Basic Network Troubleshooting.
  2. Understand concepts like DNS, DHCP, HTTP/HTTPS, FTP, SSH and VLANs.

Why Cyber Security is so Important

Why Cyber Security is so Important

Financial Impact

$10.5 trillions

According to a 2023 report by Cybersecurity Ventures, cybercrime is predicted to inflict damages totalling $10.5 trillion annually by 2025, up from $3 trillion in 2015.

Frequency of Attacks

11 seconds

A study by Cybersecurity Ventures predicted that by 2021, a business will fall victim to a ransomware attack every 11 seconds. This highlights the growing frequency and impact of cyberattacks on businesses globally.

Business Vulnerabilities

68% of business leaders

In 2022, 68% of business leaders felt their cybersecurity risks were increasing, according to Accenture's State of Cybersecurity Resilience report.

Cost of Downtime

$5,600 per min

The average cost of IT downtime is around $5,600 per minute, which equates to over $300,000 per hour, as reported by Gartner. This cost encompasses lost revenue, lost productivity, and recovery costs.

Cyber Security Guy

3.5 Million

Cybersecurity jobs will be available globally

source: Cybercrime Magazine 2023

  • Professional Oppurtunities
    • Cloud Security Engineer
    • Offensive Security Engineer
    • App Security Engineer
    • Cloud Deception Engineer
    • Red Team Engineer
  • Professional Oppurtunities
    • Cloud Security Engineer
    • Offensive Security Engineer
    • App Security Engineer
    • Cloud Deception Engineer
    • Red Team Engineer

What will you Learn

Vulnerability analysis
Vulnerability analysis
Network Security
Network Security
Penetration Testing
Penetration Testing
Web Application Security
Web Application Security
Reconnaissance and Information gathering
Reconnaissance and Information gathering
IDS, Firewalls and Honeypots
IDS, Firewalls and Honeypots

Course Curriculum

  • Basic concepts of Cybersecurity
  • The CIA triad (Confidentiality, Integrity, Availability)
  • Common threats and attacks
  • Security best practices

  • Learn about common Application Security Vulnerability.
  • OWASP Top 10
  • Basics of Manual Testing using Burp Suite or OWASP ZAP
  • Exploiting common web vulnerabilities (SQL injection, XSS)
  • Hands-On Lab.

  • What is Cloud?
  • Understand Architecture of Cloud Applications

  • What is Identity in Cloud?
  • How to manage Access in Cloud?
  • Common Access Misconfiguration Attacks
  • Mitigation and secure Identity & Access Management.
  • Temporary Access
  • Role based Access

  • Network and Application attacks
  • Application and Network Firewall
  • Network ACLs and Security Groups
  • Infrastructure and Network Misconfiguration

  • Storage Services in Cloud
  • Access misconfiguration attacks in storage service
  • Common attacks on Cloud Storage

  • Types of Computes in Cloud - Serverless, Containers, Short Lived, Dedicated and more
  • Attacks leveraging Instance Metadata
  • IAM Passrole based attacks
  • Common attacks on Computes

  • Engage Participants in a Practical CTF Challenge
  • Encourage Teamwork and Problem-solving Skills

  • Address any questions or concerns
  • Provide additional resources for further learning

Tools

R
nikto
nessus
MFSVenom
maltego
burp suite
Wireshark

LIVE Projects

Students will get hands on Live Industry Projects.

Live Projects

Certifications

After this course you can go for the following certifications

Certification Image
  • AWS Certified Security,
  • CEH Certified ethical hacker
  • OSCP Offensive Security Certified Professional
  • AZ 500 Microsoft azure security engineer associate
  • SC 300 Microsoft identity and Access Administrator Certification
  • SC 400 Microsoft Information Protection Administrator Certification
  • SC 200 Microsoft Security Operations Analyst Certification

Key Highlights

Trainer with 20+ years industry expertise
 industry expertise
Hands-on Practical Training
Hands-on Practical Training
Program materials
Program materials
Recognized course completion certificate
Recognized course completion certificate
Recordings available online post session
Recordings available online post session
Totalskill Sigma Pvt. Ltd. 2023, All Rights Reserved
Designed & Powered by Skill Sigma
Lets talk talk icon