Comprehensive information security training to
troubleshoot security threats of an organization

Objectives

Gain knowledge on tools to recognize, avoid and report cyber-attacks and security incidents. Also, learn how to keep organizations secure by preparing employees for cyber-attacks that make it past your technical controls.

Course Outcome

Prevent cyber attacks
Maintain customers’ trust
Avoid losing money or data
Reduce the risk of becoming a cyber-attack victim

Why Mazenet?



  • Expert Faculty

    Our Faculty comprises of 300+ SMEs with many years of experience. All our trainers possess a minimum of 8+ years of experience.

  • Proven Track Record

    We have served over 200+ global corporate clients, consistently maintaining a 99% success rate in meeting training objectives for 300+ technologies with quick turnaround time.

  • Blended Learning

    We provide course content over any platform that our clients prefer. You can choose an exclusive platform or a combination of ILT, VILT, and DLP.

  • Learning Paths

    The learning paths are very defined with clear benchmarks. Quantitative assessments at regular intervals measure the success of the learning program.

  • Case Study

    We have amassed over 10,000 case studies to support training delivery. Candidates will be trained to work on any real-time business vertical immediately after the training.

  • 24*7 Global Availability

    We are equipped to conduct training on any day, date or time. We have delivered training pan India, Singapore, North America, Hong Kong, Egypt and Australia.

Key Features

  • Customized Training Modules

    Training programs are highly flexible with module customizations to suit the requirements of the business units.

  • Certification

    The training can be supplemented with appropriate certifications that are recognized across the industry.

  • Multi-language Support

    Course content can be delivered in English, Spanish, Japanese, Korean or any other language upon request.

  • Personalized Training Reports

    Candidates are assessed individually at regular intervals and are provided unique learning suggestions to suit their learning calibre.

  • Industry-Oriented Training

    Industry-oriented training, completing which, candidates can be immediately deployed for billable projects.

  • Diverse Training Platforms

    Choose from Instructor-Led Training, Virtual Instructor-Led Training, Digital Learning Platform and Blended Training platforms

Course Preview

COURSE PREVIEW

Introduction to Information Security and Importance

  • CIA triad
  • Understand the risk management process
  • Risk visibility and reporting (e.g., risk register, sharing threat intelligence, Common
  • Vulnerability Scoring System (CVSS))
  • Risk management concepts (e.g., impact assessments, threat modelling, BusinessImpact
  • Analysis (BIA))
  • Risk management frameworks (e.g., ISO, NIST) » Risk treatment (e.g., accept, transfer,
  • mitigate, avoid, recast)

Identity and Access Management

  • Authentication and authorization
  • Authentication and authorization principles
  • Regulation of access
  • Access administration
  • IdAM
  • Password protection
  • Identity theft
  • Implement access controls » Mandatory » Non-discretionary » Discretionary » Role-based »
  • Attribute-based » Subject-based » Object-based

Infrastructure and applicationsecurity

  • Web server architecture
  • Web server attacks
  • Countermeasures and patch management
  • Web application architecture
  • Web application attacks
  • OWASP testing guide
  • OWASP top 10 vulnerabilities
  • Overview of Mobile Application Security and discussion on MSTG

Operating System Security

  • Introduction to Computer Network
  • Computer Networks - Architecture
  • Layered architecture
  • Open Systems Interconnect (OSI) Model
  • Transmission Control Protocol/Internet Protocol (TCP/IP)
  • Network Scanning
  • Enumeration
  • Common Network Threats/Attacks
  • Wireshark
  • Metasploit

Operating System Security

  • Vulnerability Analysis
  • Types of Vulnerability Analysis
  • Vulnerability Assessment Lifecycle
  • Vulnerability Assessment Tools
  • Vulnerability Scoring Systems
  • Vulnerability Assessments Report
  • System Hacking
  • Password Cracking
  • Privilege escalation Windows & Linux

Cryptography

  • Types of cryptography
  • Symmetric cryptography
  • Asymmetric cryptography
  • Hash functions
  • Digital signatures
  • Public Key Infrastructure (PKI)
  • Attacks on cryptosystems