Diploma in Cyber Security
About Cyber Security:
Cybersecurity is the practice of protecting computer systems, networks, devices, and data from digital attacks, theft, and damage. It involves various methods like network security, application security, information security, and endpoint protection to defend against threats such as malware, phishing, and ransomware.
Key Aspects of Cybersecurity:
- Protection: Safeguards data, systems, and users from malicious actors.
- Methods: Employs technologies (encryption, firewalls), processes (policies, authentication), and behaviors (user awareness).
Common Types of Cybersecurity:
- Network Security: Securing networks from intruders and malware.
- Application Security: Keeping software and devices free from threats.
- Information Security (InfoSec): Protecting data integrity and privacy, in storage and transit.
- Endpoint Security: Protecting individual devices like laptops, phones, and desktops.
Why you should learn Cyber Security
Learning cybersecurity equips professionals to safeguard digital assets amid rising threats like ransomware and AI-driven attacks, making it essential for India's booming IT sector. Studying cybersecurity hones analytical thinking, ethical decision-making, and continuous learning as threats evolve, boosting employability for AIIITS-style programs.
Career Opportunities
The field offers diverse paths such as ethical hacking, threat analysis, and compliance consulting, with over 1 million jobs projected in India by 2026. High demand creates job security and competitive salaries, in India roles like analysts earn ₹12-20 LPA at mid-level.
Course Contents
| CCNA: |
|---|
|
Fundamentals of Networking |
|
Enterprise Network |
|
OSI Reference Model and TCP/IP Protocol Suite |
|
Function of DNS and DHCP |
|
Media Access Control (MAC) |
|
Packet delivery process |
|
Network Security |
|
Internetwork Operating System (IOS) |
|
Port Security |
|
Troubleshooting Switching issues |
|
Initial Start-up of the Cisco Router |
|
Using the Cisco SDM |
|
Device Configuration |
|
Advanced Dynamic Routing Protocols |
|
Link State Routing Protocol |
|
Switching Technology |
|
VLAN and Trunks |
|
Ports used in a Switch for VLAN |
|
STP Configuration and Monitoring |
|
Network Address Translation (NAT) |
|
Advanced Wide Area Network. |
| RHCSA |
|---|
|
Red Hat System Administration |
|
Manage Files Graphically with Nautilus |
|
Configure Local Services |
|
Manage Physical Storage |
|
Manage Logical Volumes |
|
Monitor System Resources |
|
Manage System Software |
|
Establish Network Connectivity |
|
Administer Users and Groups |
|
Manage Files |
|
Administer Remote Systems |
|
Configure General Services |
|
Manage Virtual Machines |
|
Control the Boot Process |
|
Deploy File Sharing Services |
|
Secure Network Services |
|
Network Configuration and Troubleshooting, |
|
Managing Flexible Storage with the Logical Volume Manager (LVM) |
|
NFS and CIFS |
|
Managing User Accounts |
|
Network User Accounts with LDAP |
|
Managing SELinux |
|
Installing and Managing Software |
|
Managing Processes |
|
Tuning and Maintaining the Kernel |
|
System Recovery Techniques |
| Kali Linux: |
|---|
|
Introduction |
|
Downloading and installing virtual box |
|
Installing Kali Linux on a virtual platform |
|
Exploring the basics of Kali Linux |
|
File handling |
|
Task automation in Linux |
|
Process Management |
|
Network Configuration & Administration |
| Cyber Security: |
|---|
|
Introduction |
|
Information Security Threats |
|
Security Pyramids (CIA) |
|
Access Control |
|
Authentication Authorization |
|
Cyber Laws/Cyber Crime |
|
Security Policies and Procedures |
|
Dark Web |
|
The Amnesic incognito Live System (TAILS) |
|
Fake Anonymous Identity using Email and Messaging Encryption at Dark |
|
Deep Fake |
|
Deep Fake utilization using Dark web |
|
Cryptography |
|
Pre Attacks Phase |
|
OWASP |
|
Network Security |
|
Vulnerability Assessment & Penetration Testing (VAPT) |
|
Exploit Writing |
|
Mobile Security |
|
Email Security |
|
Web Application Security |
|
Cyber Forensics, |
|
Cloud Security |