Description
Course Name: Diploma in Cyber Security
Course Id: DCS/Q0001.
Education Qualification: 10th Class.
Duration: 370 Hrs.
How You will Get Diploma Certificate:
Step 1- Select your Course for Certification.
Step 2- Click on Enroll Now.
Step 3- Proceed to Enroll Now.
Step 4- Fill Your Billing Details and Proceed to Pay.
Step 5- You Will be Redirected to Payment Gateway, Pay Course and Exam Fee by Following Options.
Card(Debit/Credit), Wallet, Paytm, Net banking, UPI and Google pay.
Step 6- After Payment You will receive Study Material on your email id.
Step 7- After Completion of Course Study give Online Examination.
Step 8- After Online Examination you will get Diploma Certificate soft copy(Scan Copy) and Hard Copy(Original With Seal and Sign).
Step 9- After Certification you will receive Prospect Job Opportunities as per your Interest Area.
Online Examination Detail:
- Duration- 120 minutes.
- No. of Questions- 60. (Multiple Choice Questions).
- 10 Questions from each module, each carry 10 marks.
- Maximum Marks- 600, Passing Marks- 40%.
- There is no negative marking in this module.
How Students will be Graded: | ||
S.No. | Marks | Grade |
1 | 91-100 | O (Outstanding) |
2 | 81-90 | A (Excellent) |
3 | 71-80 | A (Very Good) |
4 | 61-70 | B (Good) |
5 | 51-60 | C (Average) |
6 | 41-50 | P (Pass) |
7 | 0-40 | F (Fail) |
Benefits of Certification:
- Government Authorized Assessment Agency Certification.
- Certificate Valid for Lifetime.
- Lifetime Verification of Certificate.
- Free Job Assistance as per your Interest Area.
Syllabus
Diploma in Cyber Security
Introduction to cyber security
Principles of Cyber Security, Fundamental of Computer Networking, Cyber Security Techniques, Computational Number Theory and Cryptography, Web Development Tools, Cloud Infrastructure and Services, Application and Network Security, Cyber Attacks and Counter Measures: User Perspective, Mobile Operating System and Security, Information Security Assurance: Framework, Standards and Industry best practices, Digital / Computer Forensics, Security Analysis and Reporting, Hacking Techniques, Cyberspace and Its Governance.
Information Security
The Security Problem in Computing: The meaning of computer Security, Computer Criminals, Methods of Defense, and Elementary Cryptography: Substitution Ciphers, Transpositions, Making “Good” Encryption algorithms, The Data Encryption Standard, The AES Encryption Algorithms, Public Key Encryptions, uses of Encryption, Data base Security: Security requirements, Reliability and integrity, Sensitive data, Inference, multilevel database, proposals for multilevel security, Security in Network: Threats in Network, Network Security Controls, Firewalls, Intrusion Detection Systems, Secure E-Mail.
Application Cyber Security
Operating System Basics, Data Communication & Networking, Information Security, Operating System Basics Lab, Data Communication & Networking Lab, Information Security Lab, Application Cyber Security, Network Cyber Security, Web Technology, Application Cyber Security Lab, Network Cyber Security Lab, Web Technology Lab, White Hat Hacking, Security Analysis and Reporting, Application development using PHP, White Hat Hacking Lab, Security Analysis and Reporting Lab, Application development using PHP Lab.
Network Cyber Security
Need for Security, Security Attacks, Services and Mechanisms, Network Security, Model, Substitution &Transposition Techniques, Block Cipher, Need and Principles of Public Key Cryptosystems, Key Distribution and Management, Diffie-Hellman Key Exchange, Digital Signatures, Authentication Requirements, Message Authentication Codes, Hashes, User Authentication: Password, Certificate based & Biometric Authentication, Network Security.
Cyber laws
Basic of computer and Cyber Security, Information Technology Law (Cyber Law), Cyber crime and investigation procedures, Practical Training / Field work, History of Computers, Areas of Application, Computers and its components, Application Software and System Software, Introduction to Operating System, Basics of Networks and internet, Types of Network, Definition of Cyber Security, Search Engines, E –mails and WWW; Internetworking Devices, Internet Service provider, IP Address, Working of Email system, Domain Name System, Blogs, Peer to peer sharing.
Operating System Basics
Evolution of Operating Systems: Types of operating systems – Different views of the operating systems – Principles of Design and Implementation. The process concept – system programmer’s view of processes – operating system’s views of processes – operating system services for process management. Process scheduling – Schedulers – Scheduling Algorithms, Structural overview, Concept of process and Process synchronization, Process Management and Scheduling, Hardware requirements: protection, context switching, privileged mode; Threads and their Management; Tools and Constructs for Concurrency.
Reviews
There are no reviews yet.