Advanced Cyber Security Course

In today’s world, it is of utmost importance that organizations be prepared to protect themselves from threats in cyberspace.

Cybersecurity is a collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets

$(SGD)    
Category:

Description

In today’s world, it is of utmost importance that organizations be prepared to protect themselves from threats in cyberspace.

Cybersecurity is a collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets

In the earlier session, we had focused on introducing important fundamental concepts related to cybersecurity. Introduction to cryptography, types of firewalls, different types of malware attacks and security managements were key topics discussed along with use of basic security administrator tools.

In this module, we will focus on advanced skills, tools and techniques needed to learn to protect the networks from different types of attacks, secure organizational assets, identify vulnerabilities, ensure the privacy of customers, and build secure systems and infrastructures.

This course will give you a more detailed look at cybersecurity concepts and will focus on the following areas:

1. Advanced Information and Network Security
2. Exploit Programming
3. Mobile Security
4. Wireless Security
5. Web Applications Security
6. Security in a Nutshell

Each module will include a brief description of the related theoretical concepts followed by a related hands-on workshop.

 

Course Details

Module 1: Advanced Information and Network Security
1. Advanced Cryptography
2. Denial of Service attacks
3. Interception attacks
4. DNS Poisoning
5. ARP Poisoning
6. Network Devices related SecurityModule 2: Exploit Programming
1. Introduction to Exploit Programming
2. Popular Malware Attacks
3. Buffer overflow attacks
4. Integer overflow attacks

Module 3: Mobile Security
1. Mobile Malware
2. Phishing, SMishing
3. Operating System and Device Vulnerabilities
4. Forensic Analysis of Mobile Malware

Module 4: Wireless Security
1. Scanning 802.11 Networks
2. Attacking 802.11 Wireless Networks
3. Exploiting Bluetooth
4. Other Wireless Networks

Module 5: Web Applications Security
1. Types of Application Attacks
2. Cross-site scripting (XSS)
3. XML injection
4. SQL injection
5. Directory Traversal
6. Cookies
7. Session Hijacking

Module 6: Security in a Nutshell
1. Advanced Digital Forensics
2. Linux Security
3. Windows Server Security
4. Access Control Mechanisms
5. Cloud Security
6. Email Security

 

Trainer – Dr. Sarita Singh

Dr. Sarita Singh received her Ph.D. degree for her work done in the area of Information Security. She is the recipient of the prestigious Infosys fellowship for pursuing her Ph.D. Programme. She has more than twenty-five years of teaching and research experience in Singapore, Malaysia and India in the field of Programming, Information Security, Web-application Development, Computer Networks and Engineering related modules.

She has presented papers at several National and International Conferences and has written articles for magazines. She has authored text-books for Engineering courses as well.