Cyber Security Online Training
The Cyber Security course cover the fundamental concepts underlying the construction of secure systems, starting from hardware to software, then to the human-computer interface, by using cryptography to secure interactions. Successful participants will develop a way of thinking that is security-oriented, understand how to think about adversaries and build systems that defend against them.
What are the objectives of Cyber Security Training ?
After the completion of Cyber Security training, you will be able to:
- Understand the Fundamentals of usable security
- Learn how to secure software
- Explore how to secure hardware
- Understand and practice cryptography etc.
Who is Cyber Security Training for?
- Anyone who wants to add Cyber Security skills to their profile
- Teams getting started on Cyber Security projects
What are the prerequisites for Cyber Security Training?
There is no prerequisite for the course, but a basic knowledge of Cryptography and Encryption would be an addition.
- Fundamentals of Human-Computer Interaction: users, usability, tasks, and cognitive models
- Grading and Logistics
- What is Human Computer Interaction?
- Chunking Information
- Mental Models
- Design: design methodology, prototyping, cybersecurity case study
- Intro to Design
- Design Methodologies
- Evaluation: usability studies, A/B testing, quantitative and qualitative evaluation, cybersecurity
- Strategies for Secure Interaction Design: authority, guidelines for interface design
- Intro to Usable Security Guidelines
- Authority Guidelines
- Authorization and Communication Guidelines
- Interface Guidelines for Usable Security
- Usable Authentication: authentication mechanisms, biometrics, two-factor authentication
- Usable Authentication and Passwords
- Two-Factor Authentication
- Biometric Authentication
- Gesture-based Authentication
- Usable Privacy: privacy settings, personal data sharing, data inference
- What is software security?
- Low-level security: Attacks and exploits
- Memory Layout
- Buffer Overflow
- Code Injection
- Other Memory Exploits
- Format String Vulnerabilities
- Defences against Low-Level Attacks: Introduction
- Memory Safety, Type Safety
- Avoiding Exploitation
- Return Oriented Programming – ROP
- Control Flow Integrity
- Secure Coding
- Web security: Attacks and defences
- SQL Injection, Countermeasures
- Web-based State Using Hidden Fields and Cookies
- Session Hijacking
- Cross-site Request Forgery – CSRF
- Cross-site Scripting
- Designing and Building Secure Software
- Threat Modelling or Architectural Risk Analysis
- Security Requirements
- Avoiding Flaws with Principles
- Design Category: Favor Simplicity
- Design Category: Trust with Reluctance
- Design Category: Defence in Depth, Monitoring/Traceability
- Top Design Flaws
- Static Program Analysis
- Flow Analysis, Adding Sensitivity
- Context Sensitive Analysis
- Flow Analysis: Scaling it up to a Complete Language and Problem Set
- Challenges and Variations
- Introducing Symbolic Execution
- Symbolic Execution: A Little History
- Basic Symbolic Execution
- Symbolic Execution as Search, and the Rise of Solvers
- Symbolic Execution Systems
- Penetration Testing: Introduction
- Pen Testing
- Introduction to Classical Cryptography
- Hex and ASCII
- Breaking the Vigenere Cipher
- Principles of Modern Cryptography
- Perfect Secrecy
- The One-Time Pad
- Implementing the One-Time Pad
- Computational Secrecy and Principles of Modern Cryptography
- Computational Secrecy
- Proofs of Security
- Private-Key Encryption
- Stronger Security Notions
- Pseudorandom Functions and Block Ciphers
- CPA-Secure Encryption from PRFs/Block Ciphers
- Modes of Encryption
- Security against Chosen-Ciphertext Attacks
- Padding-Oracle Attacks
- Message Authentication Codes
- Message Integrity
- A Fixed-Length MAC
- Hash Functions
- Authenticated Encryption
- Secure Communication Sessions
- Number Theory
- Key Exchange and Public-Key Encryption
- The Public-Key Revolution
- Diffie-Hellman Key Exchange
- The Public-Key Revolution Part II
- Public-Key Encryption
- Discrete-Log-Based Public-Key Encryption
- RSA-Based Public-Key Encryption
- Digital Signatures
- RSA-Based Signatures
- Identification Schemes
- Public-Key Infrastructure (PKI)
- Putting It All Together: SSL/TLS
- Parting Thoughts
- Digital System Design: Basics and Vulnerabilities
- Function Simplification and Don’t Care Conditions
- Sequential System Specification and Implementation
- Vulnerabilities in Digital Logic Design
- Design Intellectual Property Protection
- Introduction to IP Protection
- Watermarking Basics
- Watermarking Examples
- Good Watermarks
- Hardware Metering
- Physical Attacks and Modular Exponentiation
- Side Channel Attacks and Countermeasures
- Hardware Trojan (HT) and Trusted IC
- Hardware Trojan Taxonomy
- Hardware Trojan Detection Overview
- Hardware Trojan Detection Methods
- Trusted IC Design with HT Prevention
- FPGA Implementation of Crypto
- Vulnerabilities and Countermeasures in FPGA Systems
- Role of Hardware in Security and Trust
- Physical Unclonable Functions (PUF) Basics
- RO PUF: Reliability
- Trust Platform Module and Other Good Practices
keen Technologies basically offers the online instructor-led training. Apart from that we also provide corporate training for enterprises.
Our trainers have relevant experience in implementing real-time solutions on different queries related to different topics. keen Technologies also verifies their technical background and expertise.
We record each LIVE class session you undergo through and we will share the recordings of each session/class.
If you have any queries you can contact our 24/7 dedicated support to raise a ticket. We provide you email support and solution to your queries. If the query is not resolved by email we can arrange for a one-on-one session with our trainers.
You will work on real world projects wherein you can apply your knowledge and skills that you acquired through our training. We have multiple projects that thoroughly test your skills and knowledge of various aspect and components making you perfectly industry-ready.
Our Trainers will provide the Environment/Server Access to the students and we ensure practical real-time experience and training by providing all the utilities required for the in-depth understanding of the course.
If you are enrolled in classes and/or have paid fees, but want to cancel the registration for certain reason, it can be attained within 48 hours of initial registration. Please make a note that refunds will be processed within 30 days of prior request.
The Training itself is Real-time Project Oriented.
Yes. All the training sessions are LIVE Online Streaming using either through WebEx or GoToMeeting, thus promoting one-on-one trainer student Interaction.
There are some Group discounts available if the participants are more than 2.
As we are one of the leading providers of Online training, We have customers from USA, UK, Canada, Australia, India and other parts of the world.
No Reviews found for this course.