Fully Practical Corporate Security Simulation Live Training Programe.
|star star star star star||5.0 (1 ratings)|
Validity Period: 365 days
Are you an Entrepreneur or do you own a business? I hope you realize the results when a company faces any cyber attack and try to find solutions or mitigating ways. Several businesses switched to online facilities, top big tech giants are software companies and now even small stores have their online presence, but, more you are up on Internet, the more risks are waiting for you.
The complete course is Practical and Experienced Driven, almost 70% of the resources will be new to you, and are discovered or build by our team. After passing the examination, you can assist any corporate sector to set up cybersecurity essentials, as you are an “Enterprise Security Officer”.
CHECK THE COURSE PREVIEW HERE
The classes will be held online on a secure video conferencing platform with a unique generated link for each participant for every meeting.
18 Hours Training
The classes for Month Batch will be conducted from 2 PM to 4 PM on weekends for the respective month. Each class is of Two Hours LIVE happening over VCL Academy Portal Directly. Notes will be Provided.
The Examination will be held on the month-end or after a week of last day of training which gives you a good amount of time to prepare yourself. The examination consists of 50 Multiple Choice Questions and certain practical lab challenges. You need to score 80% for availing of the National Cyber Cops benefits and certification. If in case you miss the examination or not passed, you can retake it next month for no additional charges.
|Complete Course Preview||Preview|
|Module 1: Cybersecurity In Enterprise|
|Practicality of Security in Businesses|
|Cybersecurity Environment Today|
|CIA Triad and it’s Applications|
|Vulnerability, Risk and Threats|
|Overview to Enterprise Framework|
|Module 2: Cyber Threats and Attack Vectors|
|Types of different Cyber attacks on business|
|Network and System Based Attacks|
|Mobile, DDOS, Wireless attacks|
|Cloud based risks and threats|
|Module 3: Email Security and Setup|
|Overview of Email attacks and Security|
|SPF, DKIM & DMARC Records|
|Setting up SPF|
|Setting Up DKIM|
|Templates vectors and attacks|
|Module 4: Real-Time Data Breach Track|
|Understanding Intrusion Techniques|
|How Hackers Hack in Companies|
|Setting up Honeypot Trap|
|Preparing Attack and Defense|
|Maltego : Practical Approach to Tracking|
|Module 5: Detecting and Mitigating Threats|
|Overview of Firewalls and Solutions|
|Types of Firewalls and Importance|
|Windows and Linux Firewall Configuration|
|Setting own Intrusion Detection System|
|Intrusion Prevention Systems|
|Module 6: Security Operations and SIEM|
|System Information and Event Management|
|Splunk Analyst 101|
|Threat Monitoring using Splunk|
|Splunk hands on Labs|
|Qradar Installation and Setup|
|Module 7: Mitre Att&ck Framework|
|Cyber Kill Chain|
|MITRE ATT&CK Framework|
|Enterprise Matrix with ATT&CK Navigator|
|Effective Purple Teaming|
|Mapping CTI with ATT&CK|
After successful purchase, this item would be added to your courses.
You can access your courses in the following ways :