Cybersecurity Master Course
Cybersecurity Master Course
පාඨමාලාව සාර්ථකව අවසන් කොට අපගේ Cyber Security Counseling Team සමඟ එකතු වී සක්රීය Project වීමේ හැකියාව ඔයාට තියෙනවා
100 Lessons
Online Classes
Course Outline / Syllabus
1.1 Understand the Security Concepts of Information Assurance
1.1.1 The CIA Triad
1.1.2 Confidentiality
1.1.3 Integrity
1.1.4 Availability
1.1.5 Authentication and Authorization
1.1.6 Non-repudiation
1.1.7 Basic Concepts of Cryptography
1.2 Understand the Identity Types
1.2.1 Online Identity
1.2.2 Offline Identity
1.2.3 Personal Identifiable Information (PII)
1.2.4 Anonymity
1.3 Understand the Risk Management Process
1.3.1 Introduction to Risk Management
1.3.2 Importance of Risk Management
1.3.3 Risk Management Terminology
1.3.4 Threats
1.3.5 Vulnerabilities
1.3.6 Likelihood
1.3.7 Risk Identification
1.3.8 Risk Assessment
1.3.9 Risk Treatment
1.4 Understand Security Controls
1.4.1 Technical Controls
1.4.2 Administrative Controls
1.4.3 Physical Controls
1.5 Understand Governance Elements and Processes
1.4.1 Regulations and Laws
1.4.2 Standards
1.4.3 Policies
1.4.4 Procedures
1.4.5 Importance of Governance Elements
2 Incident Response, Business Continuity, and Disaster Recovery Concepts
2.1 Understand Incident Response
2.1.1 Policies
2.1.2 Procedures
2.1.3 Policies
2.1.4 Procedures
2.1.5 Policies
2.1.6 Procedures
2.2 Understand Business Continuity
2.2.1 The Importance of Business Continuity
2.2.2 The Goal of Business Continuity
2.2.3 Components of a Business Continuity Plan
2.3 Understand Disaster Recovery
2.3.1 The Importance of Disaster Recovery
2.3.2 The Goal of Disaster Recovery
2.3.3 Components of a Disaster Recovery Plan
3 Access Control Concepts
3.1 Understand Access Control Concepts
3.1.1 What is a Security Control?
3.1.2 Controls and Risks
3.1.3 Controls Assessments
3.1.4 Defense in Depth
3.1.5 Principle of Least Privilege
3.1.6 Privileged Access Management
3.1.7 Segregation of Duties
3.1.8 Authorized vs. Unauthorized Personnel
3.1.9 The Benefit of Multiple Controls
3.2 Understand Physical Access Controls
3.2.1 What Are Physical Security Controls?
3.2.2 Types of Physical Access Controls
3.2.3 Monitoring
3. Understand Logical Access Controls
3.3.1 What are Logical Access Controls?
3.3.2 Discretionary Access Control (DAC)
3.3.3 Mandatory Access Control (MAC)
3.3.4 Role-Based Access Control (RBAC)
4 AccNetwork Security
4.1. Understand Logical Access Controls
4.1.1 What is Networking?
4.1.2 Networking Models
4.1.3 Open Systems Interconnection (OSI) Model
4.1.4 Transmission Control Protocol/Internet Protocol (TCP/IP)
4.1.5 Internet Protocol (IPv4 and IPv6)
4.1.6 Wireless Local Area Networks (Wi-Fi)
4.1.7 Security of the Network
4.1.8 Ports and Protocols (Applications/Services)
4.1.9 Secure Ports
4.1.10 Three-Way (SYN, SYN-ACK, ACK) Handshake
4.2. Understand Logical Access Controls
4.2.1 Impact of Cyber Attacks
4.2.2 Types of Threats
4.2.2.1 Identity Theft
4.2.2.2 Spoofing
4.2.2.3 Phishing
4.2.2.4 DoS/DDoS
4.2.2.5 Virus
4.2.2.6 Worm
4.2.2.7 Trojan
4.2.2.8 On-path Attack
4.2.2.9 Side-channel
4.2.2.10 Advanced Persistent Threat (APT)
4.2.2.11 Insider Threats
4.2.2.12 Ransomeware
4.2.2.13 Botnets
4.2.2.14 Zero-day attacks
4.3. Understand Network Security Infrastructure
4.3.1. On-Premises Data Centers
4.3.2. Redundancy
4.3.3. Cloud Computing Fundamentals
4.3.3.1. Cloud Characteristics
4.3.3.2. Service Models
4.3.3.3. Deployment Models
4.3.3.4. Cloud Redundancy
4.3.4. Managed Service Provider (MSP)
4.3.5. Service-Level Agreement (SLA)
4.4. Understand Network Design Fundamentals
4.4.1. Network Segmentation
4.4.2. Demilitarized Zone (DMZ)
4.4.3. Virtual Local Area Network (VLAN)
4.4.4. Virtual Private Network (VPN)
4.4.5. Cloud Computing Fundamentals
4.5. Understand Network Security Controls
4.5.1. Defense in Depth
4.5.2. Zero Trust
4.5.3. Network Access Control (NAC)
4.5.4. Endpoint Security
4.5.5. Firewall
4.5.6. Intrusion Detection System (IDS)
4.5.7. Security Information and Event Eanagement (SIEM)
4.5.8. Email Gateway Security
4.5.9. Data Loss Prevention
4.5.10. Threat Intelligence Services
4.5.11. Cloud Security
4.5.12. SOAR – Security Orchestration Automation and Response
4.5.13. End-user Awareness
4.5.14. Home Networks and Personal Device Security
4.6. Understand Ethical Hacking Fundamentals
4.6.1. Information Gathering
4.6.2. OSINT Framework
4.6.2. Scanning
4.6.3. Exploitation/ Gaining Access
4.6.4. Maintaining Access
4.6.5. Clearing Tracks
4.6.6. Cyber Kill Chains
4.7. Understand Computer Forensic Fundamentals
4.7.1. Types of Investigations
4.7.2. Challenges
4.7.3. Preserving Data
4.7.4. Acquiring Data
4.7.5. Analyzing Data
5 Security Operations
.5.1. Understand Data Security
5.1.1. Data Handling
5.1.2. Data Handling Practices
5.1.3. Logging and Monitoring Security Events
5.1.4. Data Encryption
5.1.5. System Hardening
5.2. Understand Data Security
5.2.1. Common Security Policies
5.2.2. Data Handling Policy
5.2.3. Password Policy
5.2.4. Acceptable Use Policy
5.2.5. Bring Your Own Device (BYOD) Policy
5.2.6. Privacy Policy
5.2.7. Change Management Policy
Cybersecurity Master Course
නවීන තාක්ෂණයත් සමග වැඩ කරන්න කැමති, 📊 සංකීර්ණ ගැටළු විසදන්න කැමති, 💪 අභියෝහ භාරගන්න කැමති, 👨🚀 IT industry එකේ නව මානයන් හොයාගෙන යන්න කැමති, cybersecurity field එකේ job එකක් කරන්න බලාපොරොත්තු වෙන කෙනෙක්ට අවශ්ය කරන මුලික දැනුම සහ කුසලතා හදාගන්න හොදම අවස්ථාවක් ⭐.
Duration : 2 Months
Duration : 2 Installment

Account Number – 8909 3627
Name – BMTKT Bandara
Bank – Bank Of Ceylone ( BOC )
Branch – Kandy 2nd City Branch

Account Number : 1007 5740 7347
Name : BMTKT Bandara
Bank : Sampath Bank PLC
Branch : Kandy Super – 007

Account Number : 80152 47052
Name : BMTKT Bandara
Bank : Commercial Bank
Branch : Kandy City Office

Evotech Hotline
074 370 4917

