Cyber Security Online Training

Cyber Security Online Training



    The Cyber Security course cover the fundamental concepts underlying the construction of secure systems, starting from hardware to software, then to the human-computer interface, by using cryptography to secure interactions. Successful participants will develop a way of thinking that is security-oriented, understand how to think about adversaries and build systems that defend against them.

    What are the objectives of Cyber Security Training ?

    After the completion of Cyber Security training, you will be able to:

    • Understand the Fundamentals of usable security
    • Learn how to secure software
    • Explore how to secure hardware
    • Understand and practice cryptography etc.

    Who is Cyber Security Training for?

    • Anyone who wants to add Cyber Security skills to their profile
    • Teams getting started on Cyber Security projects

    What are the prerequisites for Cyber Security Training?

    There is no prerequisite for the course, but a basic knowledge of Cryptography and Encryption would be an addition.

    Course Content:

    1.Usable Security

    • Fundamentals of Human-Computer Interaction: users, usability, tasks, and cognitive models
    • Grading and Logistics
    • What is Human Computer Interaction?
    • Chunking Information
    • Mental Models
    • Design: design methodology, prototyping, cybersecurity case study
    • Intro to Design
    • Design Methodologies
    • Evaluation: usability studies, A/B testing, quantitative and qualitative evaluation, cybersecurity
    • Strategies for Secure Interaction Design: authority, guidelines for interface design
    • Intro to Usable Security Guidelines
    • Authority Guidelines
    • Authorization and Communication Guidelines
    • Interface Guidelines for Usable Security
    • Usable Authentication: authentication mechanisms, biometrics, two-factor authentication
    • Usable Authentication and Passwords
    • Two-Factor Authentication
    • Biometric Authentication
    • Gesture-based Authentication
    • Usable Privacy: privacy settings, personal data sharing, data inference

    2.Software Security

    • What is software security?
    • Low-level security: Attacks and exploits
    • Memory Layout
    • Buffer Overflow
    • Code Injection
    • Other Memory Exploits
    • Format String Vulnerabilities
    • Defences against Low-Level Attacks: Introduction
    • Memory Safety, Type Safety
    • Avoiding Exploitation
    • Return Oriented Programming – ROP
    • Control Flow Integrity
    • Secure Coding
    • Web security: Attacks and defences
    • SQL Injection, Countermeasures
    • Web-based State Using Hidden Fields and Cookies
    • Session Hijacking
    • Cross-site Request Forgery – CSRF
    • Cross-site Scripting
    • Designing and Building Secure Software
    • Threat Modelling or Architectural Risk Analysis
    • Security Requirements
    • Avoiding Flaws with Principles
    • Design Category: Favor Simplicity
    • Design Category: Trust with Reluctance
    • Design Category: Defence in Depth, Monitoring/Traceability
    • Top Design Flaws
    • Static Program Analysis
    • Flow Analysis, Adding Sensitivity
    • Context Sensitive Analysis
    • Flow Analysis: Scaling it up to a Complete Language and Problem Set
    • Challenges and Variations
    • Introducing Symbolic Execution
    • Symbolic Execution: A Little History
    • Basic Symbolic Execution
    • Symbolic Execution as Search, and the Rise of Solvers
    • Symbolic Execution Systems
    • Penetration Testing: Introduction
    • Pen Testing
    • Fuzzing


    • Introduction to Classical Cryptography
    • Hex and ASCII
    • Breaking the Vigenere Cipher
    • Principles of Modern Cryptography
    • Perfect Secrecy
    • The One-Time Pad
    • Implementing the One-Time Pad
    • Computational Secrecy and Principles of Modern Cryptography
    • Computational Secrecy
    • Pseudorandomness
    • Proofs of Security
    • Private-Key Encryption
    • Stronger Security Notions
    • Pseudorandom Functions and Block Ciphers
    • CPA-Secure Encryption from PRFs/Block Ciphers
    • Modes of Encryption
    • Security against Chosen-Ciphertext Attacks
    • Padding-Oracle Attacks
    • Message Authentication Codes
    • Message Integrity
    • A Fixed-Length MAC
    • CBC-MAC
    • Hash Functions
    • HMAC
    • Authenticated Encryption
    • Secure Communication Sessions
    • Number Theory
    • Key Exchange and Public-Key Encryption
    • The Public-Key Revolution
    • Diffie-Hellman Key Exchange
    • The Public-Key Revolution Part II
    • Public-Key Encryption
    • Discrete-Log-Based Public-Key Encryption
    • RSA-Based Public-Key Encryption
    • Digital Signatures
    • RSA-Based Signatures
    • Identification Schemes
    • Public-Key Infrastructure (PKI)
    • Putting It All Together: SSL/TLS
    • Parting Thoughts

    4.Hardware Security

    • Digital System Design: Basics and Vulnerabilities
    • Function Simplification and Don’t Care Conditions
    • Sequential System Specification and Implementation
    • Vulnerabilities in Digital Logic Design
    • Design Intellectual Property Protection
    • Introduction to IP Protection
    • Watermarking Basics
    • Watermarking Examples
    • Good Watermarks
    • Fingerprinting
    • Hardware Metering
    • Physical Attacks and Modular Exponentiation
    • Side Channel Attacks and Countermeasures
    • Hardware Trojan (HT) and Trusted IC
    • Hardware Trojan Taxonomy
    • Hardware Trojan Detection Overview
    • Hardware Trojan Detection Methods
    • Trusted IC Design with HT Prevention
    • FPGA Implementation of Crypto
    • Vulnerabilities and Countermeasures in FPGA Systems
    • Role of Hardware in Security and Trust
    • Physical Unclonable Functions (PUF) Basics
    • RO PUF: Reliability
    • Trust Platform Module and Other Good Practices

    Write a Review

    Your email address will not be published. Required fields are marked *

    Our trainers have relevant experience in implementing real-time solutions on different queries related to different topics. keen Technologies also verifies their technical background and expertise.

    We record each LIVE class session you undergo through and we will share the recordings of each session/class.

    If you have any queries you can contact our 24/7 dedicated support to raise a ticket. We provide you email support and solution to your queries. If the query is not resolved by email we can arrange for a one-on-one session with our trainers.

    You will work on real world projects wherein you can apply your knowledge and skills that you acquired through our training. We have multiple projects that thoroughly test your skills and knowledge of various aspect and components making you perfectly industry-ready.

    Our Trainers will provide the Environment/Server Access to the students and we ensure practical real-time experience and training by providing all the utilities required for the in-depth understanding of the course.

    If you are enrolled in classes and/or have paid fees, but want to cancel the registration for certain reason, it can be attained within 48 hours of initial registration. Please make a note that refunds will be processed within 30 days of prior request.

    The Training itself is Real-time Project Oriented.

    Yes. All the training sessions are LIVE Online Streaming using either through WebEx or GoToMeeting, thus promoting one-on-one trainer student Interaction.

    There are some Group discounts available if the participants are more than 2.

    As we are one of the leading providers of Online training, We have customers from USA, UK, Canada, Australia, India and other parts of the world.

    Course Reviews


    • 5 stars0
    • 4 stars0
    • 3 stars0
    • 2 stars0
    • 1 stars0

    No Reviews found for this course.

    • 4 weeks, 2 days
    Contact Us

    +1 475-212-0075

    Drop us a query

    Job Support

    Course Features

    Live Instructor-led Classes

    This isn't canned learning. Its dynamic, its interactive, its effective

    Expert Educators

    Only the best or they're out. We are constantly evaluating our trainers

    24&7 Support

    We never sleep. Need something answered at 3 am? No Problem

    Flexible Schedule

    You don't learn as per our calendar. We work according to yours.

    Customized Training's

    The most part self-managed and adaptable to suit a person's particular adapting technology needs

    Priority Based Training's

    Real-time Scenario based Assignments and Case Studies


    This web site or team is not associated with SAP AG or any other product. We are providing this service absolutely for Education and Training purpose only. We charge for the support services only, not for the actual SAP System access. All SAP Systems operate under INITIAL evaluation license. All trademarks mentioned on this web site belongs to their owners. We do not share or distribute ANY personal information we collect on this web site. For any additional information


    +91 9989754807

    Popular Courses


    Keen Technologies offering training in cities: Bangalore, Hyderabad, Chennai, Delhi, Kolkata, UK, London, Texas, Chicago, San Francisco, Dallas, Washington, New York, Houstan, Atlanta, Orlando, Boston, Toronto, Ottawa, Windsor, Australia, Dubai, Leeds.


    WhatsApp us whatsapp