Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 2

Cyber Security

*Introduction
*Job Roles in Cyber Security

*Attack Classifications
Packet Sniffing and Traffic Analysis
DNS Lookup and WHOIS Lookup
Deception Attack
Replay, Modification, and DDOS

*Security Classification
Intro and CIS
Application Security
Network Security
Cloud Security
IoT Security

*OSI Security Architecture


Intro and X 800 Services
Network Security Model
Network Access Security Model

*Malware
Introduction
Virus
Trojan Horse
Rootkits
Warms
SpyWares
AdWares

*OSI Security Architecture


Intro and X 800 Services
Network Security Model
Network Access Security Model

*Protection Against Threat


Protecting Computing Devices
Protecting Networks
Data Protection
Privacy Protection

*Most Common Attacks


Mapping
Packet Sniffing
Phishing
Vishing & MIMT
SQL Injection
BruteForce
Dictionary Attack
Rainbow Table
Credentials Stuffing
Password Spraying

*ITIL
Introduction
Service Life Cycle

*SOC
Introduction
Roles in SOC
Functioning
Forms in SOC

*Incident Response
Introduction
Effective Team
Planning
Tools

*IDS/IPS
Introduction
Types of Intruders
Types of IDS/IPS

*Antiviruses

*Endpoint Protection Systems


Introduction
Working of EPPS
Components of EPPS

*Cryptography
Introduction
Key Terminology
Methods of Cryptography
Encryption Techniques
Characteristics of Encryption Techniques
Hashing

You might also like