GMU - School of Digital Technical Competency Development
call  18001237099   |   send  info@gmu.ac.in

Specialized Cybersecurity Practices

GMUSD85
Credits: 2.00
Prerequisites : Basic programming & computer knowledge
Course Duration : 30 Hours / 12 Weeks
Start Date : 2024-08-01
End Date : 2024-10-31
Seats Remaining : 60
Domain: IT

BACK

Aim & Summary

The aim of the Specialized Cybersecurity Practices course is to focus on the implementation and management of specific cybersecurity measures in various specialized fields. It covers areas such as industrial control systems security, healthcare cybersecurity, mobile security, and secure software development. The course is designed to provide students with targeted knowledge and practical skills to address unique security challenges in specific sectors, enabling them to effectively design, implement, and manage tailored cybersecurity solutions.

Course Content
Week 1 Advanced Cryptography • Advanced Cryptographic Protocols: TLS, SSH • Cryptographic Attacks and Countermeasures • Implementing Cryptographic Solutions • Hands-On: Configuring and Testing Cryptographic Protocols
Week 2 Security for IoT Devices • IoT Security Challenges and Threats • Securing IoT Devices and Networks • IoT Security Frameworks and Standards • Hands-On: Implementing IoT Security Measures
Week 3 Mobile Security • Mobile Operating Systems Security (iOS, Android) • Common Mobile Threats and Vulnerabilities • Mobile Security Best Practices • Hands-On: Securing Mobile Applications
Week 4 Advanced Penetration Testing • Exploiting Advanced Vulnerabilities • Post-Exploitation Techniques • Reporting and Remediation of Findings • Hands-On: Conducting Advanced Penetration Testing

QUIZ 1

Week 5 Threat Hunting and Intelligence • Introduction to Threat Hunting • Threat Intelligence Sources and Feeds • Building and Using Threat Models • Hands-On: Performing Threat Hunting Activities
Week 6 Security Auditing and Compliance • Conducting Security Audits • Compliance Standards and Frameworks (NIST, ISO 27001) • Auditing Tools and Techniques • Hands-On: Performing a Security Audit
Week 7 Cybersecurity Risk Management • Risk Assessment and Management Frameworks • Risk Mitigation Strategies • Business Continuity and Disaster Recovery Planning • Hands-On: Developing a Risk Management Plan
Week 8 Secure Software Development Lifecycle (SDLC) • Integrating Security into SDLC • Threat Modeling and Secure Coding Practices • Tools for Secure Development: SAST, DAST • Hands-On: Implementing Security in SDLC

QUIZ 2

Week 9 Forensics and Incident Analysis • Digital Forensics Fundamentals • Forensic Analysis Tools and Techniques • Chain of Custody and Evidence Preservation • Hands-On: Conducting a Digital Forensic Investigation
Week 10 Security Governance and Policy • Developing and Implementing Security Policies • Governance, Risk, and Compliance (GRC) • Policy Frameworks and Best Practices • Hands-On: Creating and Enforcing Security Policies
Week 11 -
Week 12 -

PROJECT REPORT

Course Certification

Certificate will have your name, photograph and the score in the final exam with the breakup. It will have the logos of GMU and company handling the course.
I'm a beta version
©️ All rights reserved - GEM VENTURES LLP