Online Cyber Security Certification

Be aware,be secure!!



Watch Intro Video


Enroll Now


Jointly Delivered by

  • Seema Dixit

What's included :
  Mobile Support
  Discussion Forum
  Course Certificate
   Quiz

What Is Cyber Security Course

The online cyber security certification course is designed to increase the awareness of different types of threats, attacks, and cybercrimes on the internet. This course is highly recommended amongst the available cyber security courses in India. The cyber security certification training opens its doors to various career opportunities. Learn cyber security online by a professional trainer who has more than 10 years of experience in conducting training in security domains like network security, ethical hacking, penetration testing, and cybersecurity and get certified from edu plus now, Pune.


Introduction To Cyber Security Course

The cyber security online course has been constituted for educational purposes only. The online cyber security classes start off with the basics of operating system, networking and virtualization, and then introduce you to various security threats and attacks. You will then be provided with the knowledge to protect your privacy and security on the internet. You will also learn how to secure your data using various tools and techniques.
The course further covers simple data backup, restore, and recovery techniques. You will also learn how to securely use your computer while connecting to the internet by using proper browser security settings and personal firewall. This course prepares you to build your career in the cyber security field.


Key Features Of The Cyber Security Course

  • Mentorship by one of the best in business, Seema Dixit.
  • One of the best cyber security courses in Pune that provides online classes and seamless EMI options.
  • Course awarded by edu plus now, Pune.


Who Will Benefit From The Cyber Security Training Course ?

  • This cyber security certification training course is for employees in a company who want to be trained on how to protect their sensitive customer data and network from hackers.
  • This course is ideal for employees who need to be trained as part of the annual Cyber Security Awareness Training requirements.
  • Anyone who uses a computer or smartphone with an internet connection and wants to be secured from the cyber world.
  • Someone who wants to be able to browse the internet securely without being tracked by marketing companies.
  • Anyone who wants to build a career in the domain of information security or cyber security.

Tools Covered


Virtual Box
Kali Linux
Wireshark

Syllabus


  • Introduction to Cybersecurity awareness course
  • Introduction to Cybersecurity
  • Internet live statistics
  • Threatmap
  • Haveibeenpwned (Is your account safe)
  • CyberCrimes
  • Introduction to Operating System
  • Types of Servers
  • Installation of Operating system and virtualization
  • Installing Kali Linux and Virtual Box
  • Downloading Prebuilt Kali Linux machine and kali Linux iso image for virtualBox
  • Installing Prebuilt Kali Linux machine image in VMWare workstation Player
  • Installing Kali Linux using iso image in VirtualBox
  • Installing Windows 7 on VirtualBox
  • Introduction to Metasploitable Linux and how to download and open it in hypervisor
  • Installing Metasploitable Linux on VirtualBox
  • Introduction to Computer Network
  • Types of Network
  • Network Architecture
  • Computer Protocol
  • Computer Ports
  • IP Address
  • MAC Address
  • Basic Windows commands
  • Creating Network of virtual machines
  • Home Wi-Fi- Router and security
  • Introduction to Section-2 Ethical hacking
  • Ethical Hacking Terminologies
  • Phases of Ethical Hacking
  • Footprinting
  • Netcraft
  • Whois footprinting
  • Archive.org
  • Using Ping and tracert command
  • What is my ipaddress
  • Malicious links
  • IPLogger
  • google timeline
  • My activity tracker
  • Introduction to Section-2 -Scanning
  • TCP Three-Way handshake
  • Protocols and Ports
  • Port Scanners
  • Netstat
  • NMAP
  • Scanning Metasploitable Linux using tool Nmap
  • Gaining access, Maintaining access, covering tracks
  • Sniffers
  • Wireshark
  • Sniffing telnet traffic using wireshark
  • Using Armitage tool in kali to attack windows XP
  • Malwares and security
  • Keylogger
  • Bots and Botnets
  • DoS and DDoS attack
  • DoS Attack using LOIC tool
  • Social Engineering attacks
  • Phishing
  • Phishing using Kali Linux
  • Password Security
  • Password Attacks
  • How secure is my password
  • Password Guessing websites
  • MD5 hash generator and crackstation
  • Antivirus
  • Testing Antivirus using EICAR
  • Introduction to Section-3
  • Encryption and cryptography
  • Online Encryption using website Encipher it
  • Bitlocker drive encryption in Windows
  • Encryption using open source tool Veracrypt: Downloading and installing tool
  • Using veracrypt tool
  • Hash function
  • Hash Killer
  • Checking file integrity using onlinemd5.com
  • Steganography
  • Online steganography
  • Steganography tool: Xiao
  • Digital Signature
  • Introduction to Section-3 Operating system security and hardening
  • Windows 10 Security, Privacy and hardening settings
  • Firewall
  • IDS,IPS,Honeypot
  • Windows Firewall-Basic settings
  • Windows Firewall-Block Protocol http
  • Windows Firewall- Block Program
  • Browser Security
  • Mozilla Firefox Security
  • Internet Explorer Security Features-Security Zones
  • Internet Explorer Security Features-Do not Track
  • Internet Explorer Security Features-InPrivate Browsing
  • Internet Explorer Security Feature-Location tracking
  • Internet Explorer Security Feature-Pop-up Blocker
  • Google Chrome security settings
  • Email Security
  • Email Spoofing
  • Email Traching
  • Physical Security
  • How to locate lost smartphone
  • Windows 10 System image backup
  • Windows 10 backup and restore
  • Data recovery using Recuva-1
  • Data recovery using Recuva-2
  • Steps for Personal Security

Learning Outcomes

  • Students will learn basics of Operating System, Networking, Ethical Hacking, Information Security and Operating System hardening techniques.

Assessment

Type Weightage %
Content 100%
Online Cyber Security Certification


What our learners have to say about us!


Our Alumni work at



Course Fees : 3,300 (+GST)








Features
  • Indepth Coverage of Virtualization and Basic Networking.
  • Indepth Coverage of Ethical Hacking.
  • Indepth Coverage of Data/Information Security, Window Security.
  • Hands on Assignments.

"If a group of four or more participants enroll with us, a concession of 10% will be awarded to each one of them. For more details Contact us."    +91 8956167195

Why edu plus now


whyepn1

Industry-Ready Courses

Learn industry-relevant skills that’ll make your resume stand out and ensure you’re ready to tackle the job market.

whyepn2

Flexible Learning

Access online learning resources anywhere, anytime to gain valuable skills and transform your life in meaningful ways.

whyepn3

Qualified Instructors

Connect with experts and qualified instructors from reputed universities to stay on top of the ever-evolving future of work.

whyepn4

Adavanced study plans

Learn complex technical skills with videos, quizzes and assignments to develop your career and build towards a degree.

whyepn5

Focus on target

Select the best online courses in India that are not only informative and helpful to your long-term career goals but also help close the skill gap in the industry.

whyepn6

Knowledge Platform

Take advantage of a complete in-built environment for programming and get hands-on experience to solve real-world problems practically.

About the Instructor


Seema Dixit

16 Years Of Experience


Freelancer

Seema Dixit has over 16 years of experience in conducting training. She has trained more than 2000 students and professionals on various technologies like computer Networking, Operating System, Network Security, Ethical Hacking and Penetration Testing, Amazon Cloud Computing and Cybersecurity. She also has more than 10 years of experience in conducting training in security domains like Network Security, Ethical Hacking, Penetration Testing and Cybersecurity. She is Lead Security Trainer and Senior Security Analyst in IQSPL Pvt. Ltd., Pune and a Freelance trainer in Microsoft Server and Cisco Technologies, Amazon Cloud Computing, Ethical Hacking and Penetration Testing, and Cybersecurity.