Cybersecurity Awareness

Be aware,be secure!!


Jointly Delivered by

  • Seema Dixit

Enroll Now

Online Course

What's included

  Mobile Support

  Discussion Forum

  Quiz

 Course Certificate


Description

This course is designed to increase your awareness of various threats, attacks and cybercrimes on the internet. This course is created for educational purposes only. It starts with the basics of operating system, networking and virtualization, introduces you to various security threats and attacks and provides you the knowledge to protect your privacy and security on the internet. You will also learn how to secure your data using various tools and techniques. The course also covers simple data backup, restore and recovery techniques. You will also learn how to securely use your computer while connecting to internet by using proper browser security settings and personal firewall. This course also prepares you to build your carrier in cybersecurity field.


Who Should Enroll?

  • Anybody using computer, smartphone and Internet and wants to secure themself in cyber world
  • Students who want to build their career in Information security or Cyber Security

Syllabus


  • Introduction to Cybersecurity awareness course
  • Introduction to Cybersecurity
  • Internet live statistics
  • Threatmap
  • Haveibeenpwned (Is your account safe)
  • CyberCrimes
  • Introduction to Operating System
  • Types of Servers
  • Installation of Operating system and virtualization
  • Installing Kali Linux and Virtual Box
  • Downloading Prebuilt Kali Linux machine and kali Linux iso image for virtualBox
  • Installing Prebuilt Kali Linux machine image in VMWare workstation Player
  • Installing Kali Linux using iso image in VirtualBox
  • Installing Windows 7 on VirtualBox
  • Introduction to Metasploitable Linux and how to download and open it in hypervisor
  • Installing Metasploitable Linux on VirtualBox
  • Introduction to Computer Network
  • Types of Network
  • Network Architecture
  • Computer Protocol
  • Computer Ports
  • IP Address
  • MAC Address
  • Basic Windows commands
  • Creating Network of virtual machines
  • Home Wi-Fi- Router and security
  • Introduction to Section-2 Ethical hacking
  • Ethical Hacking Terminologies
  • Phases of Ethical Hacking
  • Footprinting
  • Netcraft
  • Whois footprinting
  • Archive.org
  • Using Ping and tracert command
  • What is my ipaddress
  • Malicious links
  • IPLogger
  • google timeline
  • My activity tracker
  • Introduction to Section-2 -Scanning
  • TCP Three-Way handshake
  • Protocols and Ports
  • Port Scanners
  • Netstat
  • NMAP
  • Scanning Metasploitable Linux using tool Nmap
  • Gaining access, Maintaining access, covering tracks
  • Sniffers
  • Wireshark
  • Sniffing telnet traffic using wireshark
  • Using Armitage tool in kali to attack windows XP
  • Malwares and security
  • Keylogger
  • Bots and Botnets
  • DoS and DDoS attack
  • DoS Attack using LOIC tool
  • Social Engineering attacks
  • Phishing
  • Phishing using Kali Linux
  • Password Security
  • Password Attacks
  • How secure is my password
  • Password Guessing websites
  • MD5 hash generator and crackstation
  • Antivirus
  • Testing Antivirus using EICAR
  • Introduction to Section-3
  • Encryption and cryptography
  • Online Encryption using website Encipher it
  • Bitlocker drive encryption in Windows
  • Encryption using open source tool Veracrypt: Downloading and installing tool
  • Using veracrypt tool
  • Hash function
  • Hash Killer
  • Checking file integrity using onlinemd5.com
  • Steganography
  • Online steganography
  • Steganography tool: Xiao
  • Digital Signature
  • Introduction to Section-3 Operating system security and hardening
  • Windows 10 Security, Privacy and hardening settings
  • Firewall
  • IDS,IPS,Honeypot
  • Windows Firewall-Basic settings
  • Windows Firewall-Block Protocol http
  • Windows Firewall- Block Program
  • Browser Security
  • Mozilla Firefox Security
  • Internet Explorer Security Features-Security Zones
  • Internet Explorer Security Features-Do not Track
  • Internet Explorer Security Features-InPrivate Browsing
  • Internet Explorer Security Feature-Location tracking
  • Internet Explorer Security Feature-Pop-up Blocker
  • Google Chrome security settings
  • Email Security
  • Email Spoofing
  • Email Traching
  • Physical Security
  • How to locate lost smartphone
  • Windows 10 System image backup
  • Windows 10 backup and restore
  • Data recovery using Recuva-1
  • Data recovery using Recuva-2
  • Steps for Personal Security



Tools Covered

Learning Outcomes

  • Students will learn basics of Operating System, Networking, Ethical Hacking, Information Security and Operating System hardening techniques.

Assessment

Type Weightage %
Content 100%


Course Fees

INR 3,300 (+GST)

Interested in This Program?






Location

edu plus now , 34 A/1 Suyog Centre, 7th Floor, Market Yard Rd, Gultekdi, Pune, Maharashtra 411037


Why edu plus now


whyepn1

Industry-Ready Courses

Learn industry-relevant skills that’ll make your resume stand out and ensure you’re ready to tackle the job market.

whyepn2

Flexible Learning

Access online learning resources anywhere, anytime to gain valuable skills and transform your life in meaningful ways.

whyepn3

Qualified Instructors

Connect with experts and qualified instructors from reputed universities to stay on top of the ever-evolving future of work.

whyepn4

Adavanced study plans

Learn complex technical skills with videos, quizzes and assignments to develop your career and build towards a degree.

whyepn5

Focus on target

Select the best online courses in India that are not only informative and helpful to your long-term career goals but also help close the skill gap in the industry.

whyepn6

Knowledge Platform

Take advantage of a complete in-built environment for programming and get hands-on experience to solve real-world problems practically.

About the Instructor







Seema Dixit

16 Years Of Experience


Freelancer

Seema Dixit has over 16 years of experience in conducting training. She has trained more than 2000 students and professionals on various technologies like computer Networking, Operating System, Network Security, Ethical Hacking and Penetration Testing, Amazon Cloud Computing and Cybersecurity. She also has more than 10 years of experience in conducting training in security domains like Network Security, Ethical Hacking, Penetration Testing and Cybersecurity. She is Lead Security Trainer and Senior Security Analyst in IQSPL Pvt. Ltd., Pune and a Freelance trainer in Microsoft Server and Cisco Technologies, Amazon Cloud Computing, Ethical Hacking and Penetration Testing, and Cybersecurity.