Cyber Security Training

Live Online & Classroom Enterprise Certification Training

Cyber Security Certification Training is a boon for professionals of various levels and experiences, who are eager to learn about Software security, Hardware security, cryptography and much more.

Looking for a private batch ?

REQUEST A CALLBACK
Key Features
  • Lifetime Access

  • CloudLabs

  • 24x7 Support

  • Real-time code analysis and feedback

  • 100% Money Back Guarantee

PDP BG 1
SpringPeople Logo

What is Cyber Security Training about?

The Cyber Security Certification courses cover the fundamental concepts underlying the construction of secure systems, starting from hardware to software, then to the human-computer interface, by using cryptography to secure interactions. Successful participants will develop a way of thinking that is security-oriented, understand how to think about adversaries and build systems that defend against them.

What are the objectives of Cyber Security Training ?

After the completion of Cyber Security training, you will be able to:

  • Understand the Fundamentals of usable security
  • Learn how to secure software
  • Explore how to secure hardware
  • Understand and practice cryptography etc.
Available Training Modes

Live Online Training

Classroom Training

 

PDP BG 2

Who is Cyber Security Training for?

  • Anyone who wants to add Cyber Security skills to their profile
  • Teams getting started on Cyber Security projects
  • What are the prerequisites for Cyber Security Training?

    There is no prerequisite for the course, but a basic knowledge of Cryptography and Encryption would be an addition.

    Course Outline

    • Usable Security
      • Fundamentals of Human-Computer Interaction: users, usability, tasks, and cognitive models
      • Grading and Logistics
      • What is Human Computer Interaction?
      • Chunking Information
      • Mental Models
      • Design: design methodology, prototyping, cybersecurity case study
      • Intro to Design
      • Design Methodologies
      • Evaluation: usability studies, A/B testing, quantitative and qualitative evaluation, cybersecurity
      • Strategies for Secure Interaction Design: authority, guidelines for interface design
      • Intro to Usable Security Guidelines
      • Authority Guidelines
      • Authorization and Communication Guidelines
      • Interface Guidelines for Usable Security
      • Usable Authentication: authentication mechanisms, biometrics, two-factor authentication
      • Usable Authentication and Passwords
      • Two-Factor Authentication
      • Biometric Authentication
      • Gesture-based Authentication
      • Usable Privacy: privacy settings, personal data sharing, data inference
    • Software Security
      • What is software security?
      • Low-level security: Attacks and exploits
      • Memory Layout
      • Buffer Overflow
      • Code Injection
      • Other Memory Exploits
      • Format String Vulnerabilities
      • Defences against Low-Level Attacks: Introduction
      • Memory Safety, Type Safety
      • Avoiding Exploitation
      • Return Oriented Programming - ROP
      • Control Flow Integrity
      • Secure Coding
      • Web security: Attacks and defences
      • SQL Injection, Countermeasures
      • Web-based State Using Hidden Fields and Cookies
      • Session Hijacking
      • Cross-site Request Forgery - CSRF
      • Cross-site Scripting
      • Designing and Building Secure Software
      • Threat Modelling or Architectural Risk Analysis
      • Security Requirements
      • Avoiding Flaws with Principles
      • Design Category: Favor Simplicity
      • Design Category: Trust with Reluctance
      • Design Category: Defence in Depth, Monitoring/Traceability
      • Top Design Flaws
      • Static Program Analysis
      • Flow Analysis, Adding Sensitivity
      • Context Sensitive Analysis
      • Flow Analysis: Scaling it up to a Complete Language and Problem Set
      • Challenges and Variations
      • Introducing Symbolic Execution
      • Symbolic Execution: A Little History
      • Basic Symbolic Execution
      • Symbolic Execution as Search, and the Rise of Solvers
      • Symbolic Execution Systems
      • Penetration Testing: Introduction
      • Pen Testing
      • Fuzzing
    • Cryptography
      • Introduction to Classical Cryptography
      • Hex and ASCII
      • Breaking the Vigenere Cipher
      • Principles of Modern Cryptography
      • Perfect Secrecy
      • The One-Time Pad
      • Implementing the One-Time Pad
      • Computational Secrecy and Principles of Modern Cryptography
      • Computational Secrecy
      • Pseudorandomness
      • Proofs of Security
      • Private-Key Encryption
      • Stronger Security Notions
      • Pseudorandom Functions and Block Ciphers
      • CPA-Secure Encryption from PRFs/Block Ciphers
      • Modes of Encryption
      • Security against Chosen-Ciphertext Attacks
      • Padding-Oracle Attacks
      • Message Authentication Codes
      • Message Integrity
      • A Fixed-Length MAC
      • CBC-MAC
      • Hash Functions
      • HMAC
      • Authenticated Encryption
      • Secure Communication Sessions
      • Number Theory
      • Key Exchange and Public-Key Encryption
      • The Public-Key Revolution
      • Diffie-Hellman Key Exchange
      • The Public-Key Revolution Part II
      • Public-Key Encryption
      • Discrete-Log-Based Public-Key Encryption
      • RSA-Based Public-Key Encryption
      • Digital Signatures
      • RSA-Based Signatures
      • Identification Schemes
      • Public-Key Infrastructure (PKI)
      • Putting It All Together: SSL/TLS
      • Parting Thoughts
    • Hardware Security
      • Digital System Design: Basics and Vulnerabilities
      • Function Simplification and Don't Care Conditions
      • Sequential System Specification and Implementation
      • Vulnerabilities in Digital Logic Design
      • Design Intellectual Property Protection
      • Introduction to IP Protection
      • Watermarking Basics
      • Watermarking Examples
      • Good Watermarks
      • Fingerprinting
      • Hardware Metering
      • Physical Attacks and Modular Exponentiation
      • Side Channel Attacks and Countermeasures
      • Hardware Trojan (HT) and Trusted IC
      • Hardware Trojan Taxonomy
      • Hardware Trojan Detection Overview
      • Hardware Trojan Detection Methods
      • Trusted IC Design with HT Prevention
      • FPGA Implementation of Crypto
      • Vulnerabilities and Countermeasures in FPGA Systems
      • Role of Hardware in Security and Trust
      • Physical Unclonable Functions (PUF) Basics
      • RO PUF: Reliability
      • Trust Platform Module and Other Good Practices

    Who is the instructor for this training?

    The trainer for this Cyber Security Training has extensive experience in this domain, including years of experience training & mentoring professionals.

    Cyber Security Training - Certification & Exam

    Cisco Cybersecurity Specialist

    https://www.cisco.com/c/en/us/training-events/training-certifications/certifications/specialist/security/cybersecurity.html

     

    The Cisco Cybersecurity Specialist certification recognizes security professionals who have attained specialized in-depth expertise and proven knowledge in the essential areas of proa... Read More

    Reviews