Cyber Security in Telugu

Learn Cyber Security from basic to advanced level. This master-level course is for you if you are looking to learn Cyber Security in Telugu within a short time!

Note: Limited Seats Available

Cyber Security in Telugu
Play Video about Cyber Security in Telugu
Cyber Security in Telugu

Course Details

2 Months

Course Duration

Telugu

Teaching Language

Online

Mode Of Teaching

October 12, 2022

Start Date

Life Time

Content Access

Fee Stucture

₹5,999

Note: Fee increases from next bacth

Batch Timings

Monday to Friday

07:00 PM – 09:00 PM

Course Syllabus

Cyber Security Essentials

  • Cyber security Features
  • Cyber security Domains
  • Outline and learning outcomes
  • Information security and cyber security
  • CIA Triad
  • Scope of GRC
  • Roles and approaches to cyber security

Operating Systems

  • Number System
  • OS Booting
  • Windows and Linux Booting Process
  • Processes
  • Process Synchronization
  • CPU Scheduling
  • Scheduling Algorithms
  • What is Main Memory
  • Contiguous Memory Allocation
  • Segmentation
  • Paging
  • What is Virtual Memory
  • Demand Paging
  • Page Replacement
  • Mass-Storage Structure
  • Disk Structure
  • Disk Scheduling
  • Disk Management
  • File System
  • Access methods and Directories
  • File sharing
  • Kernel modules
  • Process and Memory management
  • File systems
  • Hands on linux commands

Computer Networking

  • Data Communications : Components, Data Representation and Data Flow
  • Network Topologies
  • Network Types : LAN WAN MAN
  • Internet History and Accessing the Internet
  • Networking Devices : Repeaters, Hubs, Switches, Routers, Access Points, Servers, Controllers, Firewalls
  • OSI
  • TCP/IP
  • Guided Media
  • Unguided Media
  • Switching and Data link layer
  • Framing
  • Ethernet Protocol, Standard Ethernet, Fast Ethernet
  • Gigabit and 10 Gigabit Ethernet
  • Network Layer Services and packet Switching
  • IPV4 Addressing & Forwarding of packets
  • Internet Protocol, ICMP, ARP, RARP
  • Unicasting, multicasting, Broadcasting & Anycasting
  • Unicast Routing: Introduction, Routing Algorithms, Unicast Routing Protocols: RIP, OSPF, BGP
  • NAT, Transmission From IPV4 to IPV6, IPV6 Addressing, IPV6 Protocols
  • Services, Connectionless Protocol
  • Connection Orient Protocols
  • User Datagram Protocol
  • Transmission Control Protocol
  • SCTP: Services, Features, Packet Format, SCTP association
  • WWW, HTTP, HTTPS
  • DHCP, DNS
  • FTP, SMTP
  • POP, IMAP
  • TELNET, SSH

Cryptography

  • Overview
  • Terms used in Cryptography
  • Symmetric Key Cryptography
  • Asymmetric Key Cryptography
  • Hash Functions
  • DES, IDEA
  • AES-128
  • AES-192
  • AES-256
  • MD5
  • SHA1
  • SHA2
  • SHA3
  • SignTool
  • Java Cryptographic Architecture
  • Security Tokens
  • Key Based Authentication

IT Fundamentals for Cyber Security

  • Overview
  • Business Objectives and Goals
  • Roles and Responsibilities of Management
  • COBIT controls and frameworks
  • Importance of Risk Management
  • Risk Management Frameworks
  • Frameworks
  • Resource valuation
  • Risk Monitoring
  • Incident Response
  • Incident Response Plan
  • Incident Management Stages
  • Incident Life Cycle, 6 Phases in incident life cycle
  • Preparation
  • Identification
  • Containment
  • Eradication
  • Recovery
  • Lessons Learned
  • Digital Forensics and Digital Evidence
  • Business Continuity Planning and Disaster Recovery
  • Accessing Assets
  • Authentication and Identification of Entities
  • Authorization
  • Passwords and its types
  • MFA
  • Single Sign On (SSO)

Cyber Security Tools and Well Known Attacks

  • Information Gathering
  • Google Dorks
  • Types of attackers
  • Phases of Hacking
  • Firewalls
  • Honeypots
  • IDS and IPS
  • DOS Attacks
  • DDOS Attacks
  • SYN Flood Attacks
  • ARP Poisoning Attacks
  • Brute Force Attacks
  • SQL Injection
  • Cross Site Scripting
  • Zero day Attacks
  • Man in The Middle Attack
  • Phishing
  • Spear Phishing
  • Whaling
  • Vishing
  • Privilege Escalation
  • Shoulder Surfing
  • Dumpster Diving
  • Impersonating
  • Windows Event Viewer
  • Security Information and Event Management
  • Nmap
  • TCP Dump
  • Owasp Zap
  • Wireshark
  • Nagios
  • Aws CloudWatch
  • Cloud Security

Tools Covered

WireShark
Windows Event viewer
Tor Browser
Tcpdump
Splunk
Putty
GIT
Nmap
Nagios
Metasploit
Cisco Packet Tracer
Logrhythm

What We Provide

Online Community - Codingrad

Online Community

Although our instructors are available 24/7 to clear doubts, we also provide a community where students can post their doubts and also help each other.

LMS - Codingrad

Learning Platform

Along with daily live lectures we provide a separate learning platform where our students can learn topics, attempt quizzes, assignments and many more.

Certificate - Codingrad

Certification

Right after completion of the course by submitting the required projects and maintaining attendance, students will receive the course completion certificate. 

Watch Demo Class now in Telugu

Watch our free demo class and experience our teaching in Telugu from our Industry experts.

Your subscription could not be saved. Please try again.
Successfully registered for Demo!

Our Students Feedback

Frequently Asked Questions

The training which CodinGrad provides is Industrial training. We are well known for our course curriculum. And whatever we teach is starts from scratch to advance level. Our well experienced instructors will be available for 24/7 to clear your doubts.

Yes, all the concepts are taught from the basics to the advanced level and our instructors will make sure that the students are understanding or not before going to any futher topics.

Of course, We at CodinGrad train the students according to the industry needs and specification, We also provide in-house projects and mock interviews.

We don’t have any eligibility criteria for our courses as we teach from start to end, thus anybody interested in the course can join.

Yes, you will be receiving a course completion certification from CodinGrad after submitting the projects at the end of the course.

You can enroll by doing the payment from our website and right after payment you will receive the confirmation from our end and we’ll guide for further process.

Yes, all sessions will be recorded and will be provided for the students.