call  18001237099   |   send  info@gmu.ac.in

Fundamentals of Cybersecurity (STAGE - 1)

GMUSD81
Credits: 2.00
Prerequisites : Basic programming & computer knowledge
Course Duration : 30 Hours / 12 Weeks
Start Date : 2024-08-01
End Date : 2024-10-31
Seats Remaining : 60
Domain: IT

BACK

Aim & Summary

The aim of the Fundamentals of Cybersecurity course is to provide students with a comprehensive understanding of essential cybersecurity principles and practices. It covers foundational topics such as threat identification, risk management, network security, cryptography, and incident response. The course is designed to equip students with the knowledge and skills needed to protect information systems and data from cyber threats, ensuring they are prepared to address real-world security challenges in various professional environments. Note: This course will be carried out in 4 stages as per the job requirements

Course Content
Week 1 Introduction to Cybersecurity • What is Cybersecurity? • History and Evolution of Cybersecurity • Importance of Cybersecurity in the Modern World • Key Concepts and Terminologies
Week 2 Cyber Threats and Attacks • Types of Cyber Threats: Malware, Phishing, DDoS, etc. • Common Cyber Attacks and Their Impacts • Case Studies of Major Cyber Attacks
Week 3 Cybersecurity Principles • CIA Triad: Confidentiality, Integrity, Availability • Authentication, Authorization, and Accounting (AAA) • Risk Management and Assessment
Week 4 Networking Basics • Introduction to Networking • OSI and TCP/IP Models • IP Addressing and Subnetting • Common Network Devices and Their Functions

QUIZ 1

Week 5 Network Security Fundamentals • Firewalls and Their Types • Intrusion Detection and Prevention Systems (IDS/IPS) • Virtual Private Networks (VPNs) • Network Segmentation and Isolation
Week 6 Cryptography Basics • Introduction to Cryptography • Symmetric vs Asymmetric Encryption • Hash Functions and Digital Signatures • Public Key Infrastructure (PKI)
Week 7 Secure Software Development • Secure Coding Practices • Common Software Vulnerabilities (OWASP Top 10) • Static and Dynamic Analysis • Hands-On: Identifying and Fixing Vulnerabilities in Code
Week 8 Operating System Security • Security Features of Windows and Linux • User and Group Management • File Permissions and Access Control • Hands-On: Securing an Operating System

QUIZ 2

Week 9 Cybersecurity Tools and Technologies • Overview of Common Cybersecurity Tools • Antivirus and Antimalware Software • Security Information and Event Management (SIEM) Systems • Hands-On: Using Cybersecurity Tools
Week 10 Legal and Ethical Issues in Cybersecurity • Cyber Laws and Regulations • Privacy Issues and Data Protection • Ethical Hacking and Penetration Testing • Professional Ethics in Cybersecurity
Week 11 -
Week 12 -

PROJECT REPORT

Course Certification

Certificate will have your name, photograph and the score in the final exam with the breakup. It will have the logos of GMU and company handling the course.
I'm a beta version
©️ All rights reserved - GEM VENTURES LLP