SlideShare a Scribd company logo
Cyber Defenders 101
Cyber Security
Fastrack Course
Free
Course Content
Network Security
Web Application Security
Mobile Security
Cloud Security
Data Security and Compliance
01
02
03
04
05
Network Security
 Introduction to Information Security
 Information Security vs Cyber Security
 Security controls
 Pillars of Information Security โ€“ CIA Triad
 IDS, IPS, Firewalls, and Honeypot Concepts
 Vulnerability Assessment
 Scanning using nmap - practical
 Detecting Scans โ€“ Practical
 Web Application Security
 Understanding HTTP/HTTPS
 Web Application Architecture
 Exploiting Web Application Vulnerabilities โ€“ Practical
 Web Application Security Best Practices
Mobile Security
 Mobile Platforms and Vulnerabilities
 Rooting, Jailbreaking and Bricking concepts
 Mobile Attack Vectors
 OWASP Top 10 Mobile risks
 Exploiting Android
 Cloud Security
 Overview of Cloud Computing:
 Definition and key characteristics
 Benefits and challenges
 Cloud Service Models:
 Infrastructure as a Service (IaaS)
 Platform as a Service (PaaS)
 Software as a Service (SaaS)
 Cloud Deployment Models:
 Public
 Private
 Hybrid
 Multi-cloud
Threats to Cloud Computing
 Best Practices for Cloud Security
 Data Security and Compliance
 Importance of Data Security
 Data Classification
 Data Backup and Recovery
 Introduction to Risk Management
 Risk Analysis
 Risk Treatment Strategies
 Regulatory Compliance in Cyber Security
 Ethical Considerations in Cyber Security
www.infosectrain.com I sales@infosectrain.com

More Related Content

Similar to Free Bootcamp on Cybersecurity Training

AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
James Strong
ย 
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
EC-Council
ย 
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security ChallengesInfosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Skybox Security
ย 
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
TT L
ย 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Bill Annibell
ย 
#ALSummit: Realities of Security in the Cloud
#ALSummit: Realities of Security in the Cloud#ALSummit: Realities of Security in the Cloud
#ALSummit: Realities of Security in the Cloud
Alert Logic
ย 
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
Amazon Web Services
ย 
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterRSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
Phil Agcaoili
ย 
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App Security
Amazon Web Services
ย 
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero 3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero
Amazon Web Services
ย 
Fendley how secure is your e learning
Fendley how secure is your e learningFendley how secure is your e learning
Fendley how secure is your e learning
Bryan Fendley
ย 
CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2
ShivamSharma909
ย 
Top 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS SolutionTop 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS Solution
IBM Security
ย 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simple
Sameer Paradia
ย 
Cloud security for financial services
Cloud security for financial servicesCloud security for financial services
Cloud security for financial services
Moshe Ferber
ย 
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
PlatformSecurityManagement
ย 
Managing Cloud Security Risks in Your Organization
Managing Cloud Security Risks in Your OrganizationManaging Cloud Security Risks in Your Organization
Managing Cloud Security Risks in Your Organization
Charles Lim
ย 
Cloud Computing Enables Consumer-Centered Healthcare
Cloud Computing Enables Consumer-Centered HealthcareCloud Computing Enables Consumer-Centered Healthcare
Cloud Computing Enables Consumer-Centered Healthcare
Eiji Sasahara, Ph.D., MBA ็ฌนๅŽŸ่‹ฑๅธ
ย 
Presentation copy
Presentation   copyPresentation   copy
Presentation copy
Adel Zalok
ย 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
fanc1985
ย 

Similar to Free Bootcamp on Cybersecurity Training (20)

AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
ย 
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
ย 
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security ChallengesInfosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
ย 
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
ย 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
ย 
#ALSummit: Realities of Security in the Cloud
#ALSummit: Realities of Security in the Cloud#ALSummit: Realities of Security in the Cloud
#ALSummit: Realities of Security in the Cloud
ย 
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud...
ย 
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterRSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
ย 
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App Security
ย 
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero 3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero
ย 
Fendley how secure is your e learning
Fendley how secure is your e learningFendley how secure is your e learning
Fendley how secure is your e learning
ย 
CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2
ย 
Top 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS SolutionTop 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS Solution
ย 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simple
ย 
Cloud security for financial services
Cloud security for financial servicesCloud security for financial services
Cloud security for financial services
ย 
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ย 
Managing Cloud Security Risks in Your Organization
Managing Cloud Security Risks in Your OrganizationManaging Cloud Security Risks in Your Organization
Managing Cloud Security Risks in Your Organization
ย 
Cloud Computing Enables Consumer-Centered Healthcare
Cloud Computing Enables Consumer-Centered HealthcareCloud Computing Enables Consumer-Centered Healthcare
Cloud Computing Enables Consumer-Centered Healthcare
ย 
Presentation copy
Presentation   copyPresentation   copy
Presentation copy
ย 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
ย 

More from priyanshamadhwal2

๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
priyanshamadhwal2
ย 
๐“๐จ ๐ ๐ซ๐š๐ฌ๐ฉ ๐‘๐ข๐ฌ๐ค ๐ข๐ง ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ ๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ
๐“๐จ ๐ ๐ซ๐š๐ฌ๐ฉ ๐‘๐ข๐ฌ๐ค ๐ข๐ง ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ ๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ๐“๐จ ๐ ๐ซ๐š๐ฌ๐ฉ ๐‘๐ข๐ฌ๐ค ๐ข๐ง ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ ๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ
๐“๐จ ๐ ๐ซ๐š๐ฌ๐ฉ ๐‘๐ข๐ฌ๐ค ๐ข๐ง ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ ๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ
priyanshamadhwal2
ย 
IT_ Risk_ Identification_ CRISC_ Mind_ Map
IT_ Risk_ Identification_ CRISC_ Mind_ MapIT_ Risk_ Identification_ CRISC_ Mind_ Map
IT_ Risk_ Identification_ CRISC_ Mind_ Map
priyanshamadhwal2
ย 
Top_ 10_ Privacy_ Enhancing_ Technologies
Top_ 10_ Privacy_ Enhancing_ TechnologiesTop_ 10_ Privacy_ Enhancing_ Technologies
Top_ 10_ Privacy_ Enhancing_ Technologies
priyanshamadhwal2
ย 
Three core principles of CIA Triad confidentiality, integrity and availability
Three core principles of CIA Triad confidentiality, integrity and availabilityThree core principles of CIA Triad confidentiality, integrity and availability
Three core principles of CIA Triad confidentiality, integrity and availability
priyanshamadhwal2
ย 
Responsibilities of Data Protection Board DPB
Responsibilities of Data Protection Board DPBResponsibilities of Data Protection Board DPB
Responsibilities of Data Protection Board DPB
priyanshamadhwal2
ย 
Most Important Events IDs In Security Operations Center
Most Important Events IDs In Security Operations CenterMost Important Events IDs In Security Operations Center
Most Important Events IDs In Security Operations Center
priyanshamadhwal2
ย 
CISO 90 Days Plan Practical and Simple Roadmap
CISO 90 Days Plan Practical and Simple RoadmapCISO 90 Days Plan Practical and Simple Roadmap
CISO 90 Days Plan Practical and Simple Roadmap
priyanshamadhwal2
ย 
Types Of Network Attacks Safeguard your network against cyber threats
Types Of Network Attacks Safeguard your network against cyber threatsTypes Of Network Attacks Safeguard your network against cyber threats
Types Of Network Attacks Safeguard your network against cyber threats
priyanshamadhwal2
ย 
๐”๐ง๐ฅ๐จ๐œ๐ค ๐ญ๐ก๐ž ๐๐จ๐ฐ๐ž๐ซ ๐จ๐Ÿ ๐’๐ž๐œ๐ฎ๐ซ๐ž ๐‚๐จ๐๐ข๐ง๐ 
๐”๐ง๐ฅ๐จ๐œ๐ค ๐ญ๐ก๐ž ๐๐จ๐ฐ๐ž๐ซ ๐จ๐Ÿ ๐’๐ž๐œ๐ฎ๐ซ๐ž ๐‚๐จ๐๐ข๐ง๐ ๐”๐ง๐ฅ๐จ๐œ๐ค ๐ญ๐ก๐ž ๐๐จ๐ฐ๐ž๐ซ ๐จ๐Ÿ ๐’๐ž๐œ๐ฎ๐ซ๐ž ๐‚๐จ๐๐ข๐ง๐ 
๐”๐ง๐ฅ๐จ๐œ๐ค ๐ญ๐ก๐ž ๐๐จ๐ฐ๐ž๐ซ ๐จ๐Ÿ ๐’๐ž๐œ๐ฎ๐ซ๐ž ๐‚๐จ๐๐ข๐ง๐ 
priyanshamadhwal2
ย 
Level up your Email Security DKIM, SPF and DMARC
Level up your Email Security DKIM, SPF and DMARCLevel up your Email Security DKIM, SPF and DMARC
Level up your Email Security DKIM, SPF and DMARC
priyanshamadhwal2
ย 
How to protect yourself from online account takeovers
How to protect yourself from online account takeoversHow to protect yourself from online account takeovers
How to protect yourself from online account takeovers
priyanshamadhwal2
ย 
๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž
๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž
๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž
priyanshamadhwal2
ย 
DNS _Cache_ Poisoning_ attack_Data_ Security
DNS _Cache_ Poisoning_ attack_Data_ SecurityDNS _Cache_ Poisoning_ attack_Data_ Security
DNS _Cache_ Poisoning_ attack_Data_ Security
priyanshamadhwal2
ย 
Understanding Types Of Ransomware and how to protect against it
Understanding Types Of Ransomware and how to protect against itUnderstanding Types Of Ransomware and how to protect against it
Understanding Types Of Ransomware and how to protect against it
priyanshamadhwal2
ย 
Audit Scenario Based Interview Questions
Audit Scenario Based Interview QuestionsAudit Scenario Based Interview Questions
Audit Scenario Based Interview Questions
priyanshamadhwal2
ย 
Everything about APT 29 ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐š
Everything about APT 29 ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐šEverything about APT 29 ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐š
Everything about APT 29 ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐š
priyanshamadhwal2
ย 
Certified Information Privacy Technologist Certification Training
Certified Information Privacy Technologist Certification TrainingCertified Information Privacy Technologist Certification Training
Certified Information Privacy Technologist Certification Training
priyanshamadhwal2
ย 
Security Operations Center scenario Interview based Questions
Security Operations Center scenario Interview based QuestionsSecurity Operations Center scenario Interview based Questions
Security Operations Center scenario Interview based Questions
priyanshamadhwal2
ย 
Data protection Officier Online Training
Data protection Officier Online TrainingData protection Officier Online Training
Data protection Officier Online Training
priyanshamadhwal2
ย 

More from priyanshamadhwal2 (20)

๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ ๐Ÿ๐จ๐ซ ๐„๐Ÿ๐Ÿ๐ž๐œ๐ญ๐ข๐ฏ๐ž ๐‘๐ข๐ฌ๐ค ๐†๐จ๐ฏ๐ž๐ซ๐ง๐š๐ง๐œ๐ž
ย 
๐“๐จ ๐ ๐ซ๐š๐ฌ๐ฉ ๐‘๐ข๐ฌ๐ค ๐ข๐ง ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ ๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ
๐“๐จ ๐ ๐ซ๐š๐ฌ๐ฉ ๐‘๐ข๐ฌ๐ค ๐ข๐ง ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ ๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ๐“๐จ ๐ ๐ซ๐š๐ฌ๐ฉ ๐‘๐ข๐ฌ๐ค ๐ข๐ง ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ ๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ
๐“๐จ ๐ ๐ซ๐š๐ฌ๐ฉ ๐‘๐ข๐ฌ๐ค ๐ข๐ง ๐๐ฎ๐ฌ๐ข๐ง๐ž๐ฌ๐ฌ ๐‚๐‘๐ˆ๐’๐‚ ๐Œ๐ข๐ง๐ ๐Œ๐š๐ฉ
ย 
IT_ Risk_ Identification_ CRISC_ Mind_ Map
IT_ Risk_ Identification_ CRISC_ Mind_ MapIT_ Risk_ Identification_ CRISC_ Mind_ Map
IT_ Risk_ Identification_ CRISC_ Mind_ Map
ย 
Top_ 10_ Privacy_ Enhancing_ Technologies
Top_ 10_ Privacy_ Enhancing_ TechnologiesTop_ 10_ Privacy_ Enhancing_ Technologies
Top_ 10_ Privacy_ Enhancing_ Technologies
ย 
Three core principles of CIA Triad confidentiality, integrity and availability
Three core principles of CIA Triad confidentiality, integrity and availabilityThree core principles of CIA Triad confidentiality, integrity and availability
Three core principles of CIA Triad confidentiality, integrity and availability
ย 
Responsibilities of Data Protection Board DPB
Responsibilities of Data Protection Board DPBResponsibilities of Data Protection Board DPB
Responsibilities of Data Protection Board DPB
ย 
Most Important Events IDs In Security Operations Center
Most Important Events IDs In Security Operations CenterMost Important Events IDs In Security Operations Center
Most Important Events IDs In Security Operations Center
ย 
CISO 90 Days Plan Practical and Simple Roadmap
CISO 90 Days Plan Practical and Simple RoadmapCISO 90 Days Plan Practical and Simple Roadmap
CISO 90 Days Plan Practical and Simple Roadmap
ย 
Types Of Network Attacks Safeguard your network against cyber threats
Types Of Network Attacks Safeguard your network against cyber threatsTypes Of Network Attacks Safeguard your network against cyber threats
Types Of Network Attacks Safeguard your network against cyber threats
ย 
๐”๐ง๐ฅ๐จ๐œ๐ค ๐ญ๐ก๐ž ๐๐จ๐ฐ๐ž๐ซ ๐จ๐Ÿ ๐’๐ž๐œ๐ฎ๐ซ๐ž ๐‚๐จ๐๐ข๐ง๐ 
๐”๐ง๐ฅ๐จ๐œ๐ค ๐ญ๐ก๐ž ๐๐จ๐ฐ๐ž๐ซ ๐จ๐Ÿ ๐’๐ž๐œ๐ฎ๐ซ๐ž ๐‚๐จ๐๐ข๐ง๐ ๐”๐ง๐ฅ๐จ๐œ๐ค ๐ญ๐ก๐ž ๐๐จ๐ฐ๐ž๐ซ ๐จ๐Ÿ ๐’๐ž๐œ๐ฎ๐ซ๐ž ๐‚๐จ๐๐ข๐ง๐ 
๐”๐ง๐ฅ๐จ๐œ๐ค ๐ญ๐ก๐ž ๐๐จ๐ฐ๐ž๐ซ ๐จ๐Ÿ ๐’๐ž๐œ๐ฎ๐ซ๐ž ๐‚๐จ๐๐ข๐ง๐ 
ย 
Level up your Email Security DKIM, SPF and DMARC
Level up your Email Security DKIM, SPF and DMARCLevel up your Email Security DKIM, SPF and DMARC
Level up your Email Security DKIM, SPF and DMARC
ย 
How to protect yourself from online account takeovers
How to protect yourself from online account takeoversHow to protect yourself from online account takeovers
How to protect yourself from online account takeovers
ย 
๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž
๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž
๐‡๐จ๐ฐ ๐ญ๐จ ๐๐ž๐œ๐จ๐ฆ๐ž ๐š๐ง ๐ˆ๐“ ๐€๐ฎ๐๐ข๐ญ๐จ๐ซ: ๐€ ๐’๐ญ๐ž๐ฉ-๐›๐ฒ-๐’๐ญ๐ž๐ฉ ๐†๐ฎ๐ข๐๐ž
ย 
DNS _Cache_ Poisoning_ attack_Data_ Security
DNS _Cache_ Poisoning_ attack_Data_ SecurityDNS _Cache_ Poisoning_ attack_Data_ Security
DNS _Cache_ Poisoning_ attack_Data_ Security
ย 
Understanding Types Of Ransomware and how to protect against it
Understanding Types Of Ransomware and how to protect against itUnderstanding Types Of Ransomware and how to protect against it
Understanding Types Of Ransomware and how to protect against it
ย 
Audit Scenario Based Interview Questions
Audit Scenario Based Interview QuestionsAudit Scenario Based Interview Questions
Audit Scenario Based Interview Questions
ย 
Everything about APT 29 ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐š
Everything about APT 29 ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐šEverything about APT 29 ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐š
Everything about APT 29 ๐“๐ก๐ž ๐‚๐จ๐ณ๐ฒ ๐๐ž๐š๐ซ ๐„๐ง๐ข๐ ๐ฆ๐š
ย 
Certified Information Privacy Technologist Certification Training
Certified Information Privacy Technologist Certification TrainingCertified Information Privacy Technologist Certification Training
Certified Information Privacy Technologist Certification Training
ย 
Security Operations Center scenario Interview based Questions
Security Operations Center scenario Interview based QuestionsSecurity Operations Center scenario Interview based Questions
Security Operations Center scenario Interview based Questions
ย 
Data protection Officier Online Training
Data protection Officier Online TrainingData protection Officier Online Training
Data protection Officier Online Training
ย 

Recently uploaded

Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
ย 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
ย 
Bร€I TแบฌP Dแบ Y THรŠM TIแบพNG ANH LแปšP 7 Cแบข Nฤ‚M FRIENDS PLUS SรCH CHร‚N TRแปœI SรNG Tแบ O ...
Bร€I TแบฌP Dแบ Y THรŠM TIแบพNG ANH LแปšP 7 Cแบข Nฤ‚M FRIENDS PLUS SรCH CHร‚N TRแปœI SรNG Tแบ O ...Bร€I TแบฌP Dแบ Y THรŠM TIแบพNG ANH LแปšP 7 Cแบข Nฤ‚M FRIENDS PLUS SรCH CHร‚N TRแปœI SรNG Tแบ O ...
Bร€I TแบฌP Dแบ Y THรŠM TIแบพNG ANH LแปšP 7 Cแบข Nฤ‚M FRIENDS PLUS SรCH CHร‚N TRแปœI SรNG Tแบ O ...
Nguyen Thanh Tu Collection
ย 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
ย 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
ย 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
ย 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
ย 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
Celine George
ย 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
ย 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
ย 
Bossa Nโ€™ Roll Records by Ismael Vazquez.
Bossa Nโ€™ Roll Records by Ismael Vazquez.Bossa Nโ€™ Roll Records by Ismael Vazquez.
Bossa Nโ€™ Roll Records by Ismael Vazquez.
IsmaelVazquez38
ย 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
ย 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
ย 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
ย 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
melliereed
ย 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
ย 
Stack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 MicroprocessorStack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 Microprocessor
JomonJoseph58
ย 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
ย 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
khuleseema60
ย 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
ย 

Recently uploaded (20)

Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
ย 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
ย 
Bร€I TแบฌP Dแบ Y THรŠM TIแบพNG ANH LแปšP 7 Cแบข Nฤ‚M FRIENDS PLUS SรCH CHร‚N TRแปœI SรNG Tแบ O ...
Bร€I TแบฌP Dแบ Y THรŠM TIแบพNG ANH LแปšP 7 Cแบข Nฤ‚M FRIENDS PLUS SรCH CHร‚N TRแปœI SรNG Tแบ O ...Bร€I TแบฌP Dแบ Y THรŠM TIแบพNG ANH LแปšP 7 Cแบข Nฤ‚M FRIENDS PLUS SรCH CHร‚N TRแปœI SรNG Tแบ O ...
Bร€I TแบฌP Dแบ Y THรŠM TIแบพNG ANH LแปšP 7 Cแบข Nฤ‚M FRIENDS PLUS SรCH CHร‚N TRแปœI SรNG Tแบ O ...
ย 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
ย 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
ย 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
ย 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
ย 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
ย 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
ย 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
ย 
Bossa Nโ€™ Roll Records by Ismael Vazquez.
Bossa Nโ€™ Roll Records by Ismael Vazquez.Bossa Nโ€™ Roll Records by Ismael Vazquez.
Bossa Nโ€™ Roll Records by Ismael Vazquez.
ย 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
ย 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
ย 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
ย 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
ย 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
ย 
Stack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 MicroprocessorStack Memory Organization of 8086 Microprocessor
Stack Memory Organization of 8086 Microprocessor
ย 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
ย 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
ย 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
ย 

Free Bootcamp on Cybersecurity Training

  • 1. Cyber Defenders 101 Cyber Security Fastrack Course Free
  • 2. Course Content Network Security Web Application Security Mobile Security Cloud Security Data Security and Compliance 01 02 03 04 05
  • 3. Network Security Introduction to Information Security Information Security vs Cyber Security Security controls Pillars of Information Security โ€“ CIA Triad IDS, IPS, Firewalls, and Honeypot Concepts Vulnerability Assessment Scanning using nmap - practical Detecting Scans โ€“ Practical Web Application Security Understanding HTTP/HTTPS Web Application Architecture Exploiting Web Application Vulnerabilities โ€“ Practical Web Application Security Best Practices
  • 4. Mobile Security Mobile Platforms and Vulnerabilities Rooting, Jailbreaking and Bricking concepts Mobile Attack Vectors OWASP Top 10 Mobile risks Exploiting Android Cloud Security Overview of Cloud Computing: Definition and key characteristics Benefits and challenges Cloud Service Models: Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Cloud Deployment Models: Public Private Hybrid Multi-cloud
  • 5. Threats to Cloud Computing Best Practices for Cloud Security Data Security and Compliance Importance of Data Security Data Classification Data Backup and Recovery Introduction to Risk Management Risk Analysis Risk Treatment Strategies Regulatory Compliance in Cyber Security Ethical Considerations in Cyber Security