panel_start Introduction panel_end

21, 22, & 23 May

11:00 am- 1:00 pm

In today’s Internet-dependent business environment, organizations must link their systems across enterprise-wide and virtual private networks as well as connect mobile users. In this course, you learn how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to network threats. “Cyber awareness has become the need of the hour.”  Learning Objective:

  • Analyze your exposure to security threats and protect your organization’s systems and data
  • Deploy firewalls and data encryption to minimize threats
  • Manage risks emanating from inside the organization and from the Internet
  • Preventing unwanted network access with a personal firewall.

panel_start Course Outline panel_end

Part I – Cyber Crime, Frauds and Risks1. Security goals

  • Confidentiality
  • Integrity
  • Authentication
  • Authorization
  • Accountability
  • Non repudiation
  • Availability

2. Security Mechanisms

  • Cryptography
  • Message Authentication Codes and Cryptographic Hash Functions
  • Passwords, Biometrics and Authentication Protocols
  •  Access control (MAC, DAC, RBAC, ABAC)
  • Captchas and resource control
  • Auditing/logging
  • Non-repudiation protocols

3. Attacks (Buffer Overflow, SQL and Command Injection, DNS cache poisoning, XSS, XSRF, DoS/DDoS, Malware, etc.) and Threat Modeling 4. Laws of Security5. Secure coding principles6. Cyber-crime, cyber bullying and cyber terrorism7. Internet Safety and data securityPart II. Computer Security from the Data Science Perspective

  1. Unique Challenges of security domain
  2. Data Mining techniques (association rule mining, clustering, anomaly detection) with applications to malware detection
  3. Machine Learning techniques (Decision Trees, Support Vector Machines, Neural Networks, one class learning, semi-supervised learning) with applications to intrusion detection and malware detection.

Part III. Email Masquerade and Social Engineering Attacks

  1. Fake emails, phishing and spear-phishing – fundamental characteristics
  2. Natural language processing/Natural language generation
  3. Comprehensive detection methods for social engineering attacks
  4. Education and training regimes

panel_start How to Register: panel_end

  • Fees: Rs. 3,500/- + 18% GST Per Person
  • Please write to register@princetonacademy.co.in / Call -022 67256200 / WhatsApp on – 9769579090
  • Mention the name of participant, company, contact details.

Course Content

No content available. Please add it via the ACF field.

COURSE SCHEDULE & FEES

DOWNLOAD COURSE CONTENTS

Please click the button below to download the course content. You'll need to provide your contact information to receive the document.

×

Download Course Content

Please fill out the form below to download the course content PDF.

INCOMPANY/GROUP TRAINING REQUEST

Why Choose Our Incompany Program?

  • 🎯 Tailored content specific to your business goals
  • 👥 Train entire teams together, saving time and cost
  • 📍 Delivered at your location or virtually
  • 📅 Flexible scheduling to suit your timelines
  • 📈 Increase retention and application of skills


    Current topic: [decoded_course_title]

    Any customisation Required