Limited Offer !! 16 Course Bundle for Sale @ ₹6999/-
Cyber Security Analyst Training Malayalam
Cyber Security Analyst Training
Live session recording 

Language: Malayalam

Trainer Support: On WhatsApp

Level: Beginner to Intermediate

Validity Period: 365 days

₹8000 80.7% OFF

₹1499 excluding VAT

Demo

Includes Concepts + Practical Demo

Scenario based learning

Included best practices for a hands-on understanding

Trainer support for 1 Year on WhatsApp

Training Syllabus

Module 1: Introduction to Cybersecurity

  • Overview of Cybersecurity
  • Types of Hackers
  • Evolution of Cyber Threats
  • Introduction to Cybersecurity Framework
  • Understanding the Cybersecurity Framework
  • Different roles in cybersecurity
  • Responsibilities of cybersecurity professionals

Module 2: Fundamentals of Network Security

  • OSI Model
  • TCP/IP Protocol Suite
  • LAN Security
  • Firewalls and Secure Gateways
  • IDS and IPS
  • NAC
  • Proxy
  • Secure Sockets Layer (SSL)
  • Spoofing
  • DNS Attacks

Hands-on Lab: 

NGFW, IPS, Proxy, SSL Inspection, Attack Mitigation using NGFW

Module 3: Operating System Security

  • Operating Systems
  • User Account Management
  • Permission Management
  • Access Controls
  • Patch Management
  • Events and Logs
  • Endpoint Security Solutions

Hands-on Lab:
Linux OS/Windows OS Access Controls
File/Directory Permission Management
Analysing Events and Logs

Module 4: Cryptography

  • Basics of Cryptography
  • Keys and Tokens
  • Symmetric Cryptography
  • Asymmetric Cryptography
  • Hash Functions
  • SSL/TLS
  • Digital Signatures

Hands-on LAB:
Traffic inspection
Hash decoding


Module 5: Threats and Attacks

  • Attack Surface
  • Malware
  • Ransomware
  • Phishing
  • Social Engineering
  • Denial-of-Service (DoS) Attacks
  • Man-in-the-Middle Attacks
  • OWASP top 10

    Hands-on Lab:
    Phishing Demo
    Social Engineering Demo
    MITM Demo
    OWASP ZAP Proxy

Module 6: Security Policies and Procedures

  • Password Policies
  • Acceptable Use Policies
  • Authentication and Authorization
  • Least Privilege Access
  • ZTNA
  • Perimeter Security
  • Internal Network Security
  • Security Planning and Execution
  • Business Continuity
  • Security Information and Event Management (SIEM)
  • Vulnerability Assessments
  • Penetration Testing
  • Reporting and Mitigation
  • Cybersecurity Laws and Regulations

Hands-on LAB:
Least Privilage Access
Infrastructure Security Design
Open Source SIEM Tool Demo
Vulnerability Assessment

Module 7: Incident Response and Management
  • Cyber Incident Response Team
  • Incident Response Lifecycle
  • Incident Reporting
  • Forensics Basics
  • Endpoint Detection and Response
  • XDR and SOAR
Hands-On LAB:
Incident Reporting
EDR and XDR

LAB/Activities are planned in such a way that all the learners can do hands-on on their PCs. Trainer will demonstrate or guide learners to setup demo lab.
Minimum PC Hardware Specs: Intel i3 Processor/ AMD, 8 GB RAM, 40 GB HDD.
Software : Linux/Windows OS, Virtual Box/Vmware Player
Licenses: Opensource Appliances/Applications

About Cyber Security

The field of cybersecurity is dedicated to safeguarding digital systems, networks, and data from unauthorized access, attacks, and damage. Cybersecurity professionals play a crucial role in protecting individuals, organizations, and governments from cyber threats, such as malware, ransomware, phishing, and other malicious activities. They employ a range of tools, technologies, and strategies to identify vulnerabilities, implement robust security measures, and respond effectively to incidents.