Cyber Security in Telugu

Learn Cyber Security from basic to advanced level. This master-level course is for you if you are looking to learn Cyber Security in Telugu within a short time!

Note: Limited Seats Available

Cyber Security in Telugu
Play Video about Cyber Security in Telugu

Course Details

2 Months

Course Duration

Telugu

Teaching Language

Online

Mode Of Teaching

June 01, 2022

Start Date

Life Time

Content Access

Fee Stucture

₹4,999

Including GST

Batch Timings

Monday to Friday

07:00 PM – 09:00 PM

Course Syllabus

Introduction to Cyber Security

  • Cyber security Features
  • Cyber security Domains
  • Outline and learning outcomes
  • Why Cyber Security
  • Information security and cyber security
  • Statistics and factors affecting cyber security
  • CIA Triad and Scope of GRC
  • Roles and approaches to cyber security
  • Threat Actors, Attacks, and Mitigation
  • Security Policies and Procedures
  • Cybersecurity Mitigation Methods
  • Identity, access and data management
  • Dos Attack
  • Syn flood Attack
  • DDOS Attack
  • Brute Force Attacks
  • ARP Poisoning Attack
  • Zero-Day Attacks
  • Buffer Overflows and Buffer Overflow Attacks
  • SQL Injection Attack
  • How SQL Injection works
  • Cross-Site Scripting
  • Cross-Site Request Forgery (XSRF)
  • Phishing
  • Spear Phishing
  • Whaling
  • Vishing
  • Privilege Escalation
  • Social Engineering attacks:
    • Shoulder Surfing
    • Dumpster Diving
    • Impersonating

IT Fundamentals And Networking For Cyber Security

  • Introduction
  • Management Support
  • Performance Management
  • Risk Management
  • Personnel Management
  • Information Security Programs
  • Supply chain
  • Incident Response
  • Incident Response Plan
  • Incident Management Stages
    • Incident Life Cycle: There are 6 Phases in incident life cycle. The incident response phases are:
      1. Preparation
      2. Identification
      3. Containment
      4. Eradication
      5. Recovery
      6. Lessons Learned
  • Digital Forensics and Digital Evidence
  • Business Continuity Planning and Disaster Recovery
  • Virtualization and Hypervisor
  • Data Communications: Components, Data Representation, Data Flow
  • What is a Network
  • Network Topologies
  • Network Types: LAN, WAN, Switching, The Internet, Internet History, Accessing the Internet
  • Networking Devices: Repeaters, Hubs, Switches, Routers, Servers, Access Points, Endpoints,
    controllers, Servers, Firewalls.
  • Reference Models: OSI Layers and TCP/IP
  • Number System: Binary, Octadecimal, hexadecimal
  • GUIDED MEDIA: Single-mode Fiber, multimode Fiber, Copper, Connections (Ethernet shared Media
    and Point to Point), Concepts of POE, Cable Issues
  • UNGUIDED MEDIA: Radio Waves, Microwaves, Infrared
  • Switching and Data link layer
  • Three modes of switching
  • Circuit-switched Networks
  • Packet Switching
  • Structure of circuit and packet switches
  • Nodes, Links, Two categories of links, Two sublayers
  • Three types of addressing, ARP, Framing
  • Ethernet (Wired Lan’s): Ethernet Protocol, Standard Ethernet, Fast Ethernet, Gigabit Ethernet, 10
    Gigabit Ethernet, Telephone Networks, Cable Networks, SONET, ATM
  • Wireless Lan’s: IEEE 802.11, Bluetooth, WiMax, Cellular Telephony, Satellite Networks
  • Network Layer Services, Packet Switching, Network Layer Performance
  • IPV4 Addressing and Forwarding of IP Packets
  • Internet Protocol (IP), ICMP, Mobile IP
  • Routing Protocols: Unicasting, Multicasting, Broadcasting, Anycasting
  • Unicast Routing: Introduction, Routing Algorithms, Unicast Routing Protocols: RIP, OSPF, BGP
  • Multicasting Routing: Basics, Intradomain multicast protocols: DVMRP, MOSPF, PIM, Interdomain multicast protocols: IGMP
  • NAT, Transmission From IPV4 to IPV6, IPV6 Addressing, IPV6 Protocols
  • Introduction: Services, Connectionless and connection-Oriented Protocols
  • Protocols: Simple protocol, stop and wait protocol, GBN Protocol, selective repeat protocol
  • Port Numbers
  • User Datagram Protocol
  • Transmission Control Protocol
  • SCTP: Services, Features, Packet Format, SCTP association
  • Introduction, Client server programming, Iterative Programming In C and JAVA
  • World Wide Web and HTTP, FTP, Electronic Mail, Telnet, Secure Shell(SSH), DNS, DHCP
  • Network Architecture
  • Host Based Security
  • Computer-Based Information System
  • Wireless and virtual Private Networks
  • VPN Applications for PC
  • Why we use VPN?
  • VPN Tunneling
  • Network Security Controls
  • Security Testing
  • Hardware Failures
  • What is a Firewall?
  • Types of Firewalls
  • Firewall Devices
  • Firewall Security
  • Firewall Uses
  • What is Operating System Security?
  • OS – Overview
  • OS – Types
  • OS – Services
  • OS – Properties
  • OS – Processes
  • OS – Process Scheduling
  • OS – Scheduling algorithms
  • OS – Multi-threading
  • OS – Memory Management
  • OS – Virtual Memory
  • OS – I/O Hardware
  • OS – I/O Software
  • OS – File System
  • OS – Security
  • OS – Linux

Algorithms:

  • IDEA Algorithm
  • MD5 Algorithm
  • Symmetric Algorithms
  • Diffie Hellman Key Exchange Algorithm
  • Digital Signature Algorithm
  • Encryption Algorithm
  • Advanced Encryption Standard
  • Asymmetric Encryption
  • ElGamal Encryption
  • HMAC
  • DES Algorithm
  • Brute Force Algorithm
  • SHA Algorithm
  • RSA Algorithm
  • What Is Digital Certificate?
  • Certificate Revocation
  • RC5
  • Encoding
  • Encryption
  • Symmetric encryption
  • Asymmetric encryption
  • Hashing
  • Cryptography tools
  • Public Key infrastructure
  • Email and disk Encryption
  • Cryptanalysis and countermeasures

Cyber Security Attacks and Cyber Tools

  • Linux Basics
  • VM Setup
  • Capture the Flag
  • Google dorks
  • Information Gathering on web servers
  • Reconnaissance
  • Scanning
  • Gaining Access
  • Maintaining Access
  • Clearing Tracks
  • Reporting
  • Cross site scripting
  • SQL Injection
  • Foot printing concepts
  • Foot printing through search engines, web services, social networking sites
  • Website, email, DNS and network Foot printing
  • Foot printing tools and counter measures
  • IDS Firewalls and Honeypots concepts
  • IDS Firewalls and Honeypots Solutions
  • Evading IDS
  • Evading Firewalls
  • IDS/Firewall Evading tools
  • Detecting honeypots
  • IDS/firewall evasion countermeasures
  • Sniffing concepts
  • Sniffing technique MAC attacks
  • Sniffing technique DHCP attacks
  • Sniffing technique ARP Poisoning
  • Sniffing technique spoofing attacks
  • Sniffing technique DNS Poisoning
  • Sniffing tools and counter measures
  • Types of man in middle attacks
  • IP Spoofing attacks
  • Email Hijacking
  • HTTPS Spoofing
  • Wi-Fi Eavesdropping
  • DNS Spoofing
  • SSL Stripping
  • ARP Spoofing
  • Man-in-the-Browser
  • How does man in the middle attack work?
  • Prevention methods to prevent man in the middle attack
  • Install Anti-virus
  • Use Private Wi-Fi networks
  • Network Security
  • Secure Your Communication
  • Use VPN
  • MITM attack detection tools
  • Concepts
  • Cracking passwords
  • Escalating Privilege
  • Executing applications
  • Hiding files and covering tracks

 

  • DOS/DDOS Concepts
  • DOS/DDOS Attack techniques
  • Botnets
  • DOS/DDOS Attack tools
  • Counter measure and protection tools
  • Web servers
  • Web Applications
  • Wireless networks
  • Mobile Platforms
  • Concepts
  • Cloud computing threats
  • Cryptojacking
  • Data breaches
  • Denial of service
  • Insider threats
  • Hijacking accounts
  • Insecure applications
  • Inadequate training
  • Cloud computing attacks
  • Cloud security

  • Security Information and Event Management SIEM
  • Cloud security tools
  • Wireshark
  • Metasploit
  • Tcpdump
  • Nmap
  • Splunk
  • Nagios
  • Burp Suite
  • Metasploit
  • Pentesting
  • Windows Event viewer

Tools Covered

WireShark
Windows Event viewer
Tor Browser
Tcpdump
Splunk
Putty
GIT
Nmap
Nagios
Metasploit
Cisco Packet Tracer
Logrhythm

What We Provide

Online Community - Codingrad

Online Community

Although our instructors are available 24/7 to clear doubts, we also provide a community where students can post their doubts and also help each other.

LMS - Codingrad

Learning Platform

Along with daily live lectures we provide a separate learning platform where our students can learn topics, attempt quizzes, assignments and many more.

Certificate - Codingrad

Certification

Right after completion of the course by submitting the required projects and maintaining attendance, students will receive the course completion certificate. 

Watch Demo Class now in Telugu

Watch our free demo class and experience our teaching in Telugu from our Industry experts.

Your subscription could not be saved. Please try again.
Successfully registered for Demo!

Our Students Feedback

Frequently Asked Questions

The training which CodinGrad provides is Industrial training. We are well known for our course curriculum. And whatever we teach is starts from scratch to advance level. Our well experienced instructors will be available for 24/7 to clear your doubts.

Yes, all the concepts are taught from the basics to the advanced level and our instructors will make sure that the students are understanding or not before going to any futher topics.

Of course, We at CodinGrad train the students according to the industry needs and specification, We also provide in-house projects and mock interviews.

We don’t have any eligibility criteria for our courses as we teach from start to end, thus anybody interested in the course can join.

Yes, you will be receiving a course completion certification from CodinGrad.

You can enroll by doing the payment from our website and right after payment you will receive the confirmation from our end and we’ll guide for further process.

Yes, all sessions will be recorded and will be provided for the students.