Cyber Security Programs
Schedule and Registration
Praxis Placement Program
Cyber Security Programs at Praxis Business School
The ability to secure information within a modern enterprise—large or small—is a growing challenge. Threats to information security are global, persistent, and increasingly sophisticated. Long gone are the days when managers could hope to secure the enterprise through ad hoc means. Effective information security at the enterprise level requires participation, planning, and practice. It is an on-going effort that requires management and staff to work together from the same script. Fortunately, the information security community has developed a variety of resources, methods, and best practices to help modern enterprises address the challenge. Unfortunately, employing these tools demands a high degree of commitment, understanding, and skill—attributes that must be sustained through constant awareness and training.
Cyber Security programs at Praxis Business School are designed to teach security practitioners how to engage all functional levels within the enterprise to deliver information system security. To this end, the courses address a range of topics, each of which is vital to securing the modern enterprise.
The Cyber Security Programs are scheduled for launch soon. Watch out this space for exact details.
Outline of short-term security sentinel courses of Praxis Business School
|Sl. No.||Security Sentinel Courses Training||Pre Requisite||Target Audience||Terminal Objective||Duration|
|A||Basic||This is an entry level course||Anyone/ End User/ Company Employee/ Basic Computer User||Understanding of the technical concepts and importance of proper detection mechanisms and prevention for Cyber security. Desktop security||05 Working Days /
|B||Intermediate||Basic Networking understanding||Information System Owners /Analysts/ Cyber Security Managers/ IT Engineer||Participants will be able to establish an industry acceptable hardening and pen testing concepts.||05 Working Days /
|C||Advanced||Sound knowledge of TCP/IP, Computer hardware||IS Security Officers Cyber Security Managers/Admins / IT Engineer||Confidently able to assess security loopholes. Visualise various cyber threats and select the correct response mechanism. Confident in configuration of various security appliances.||10 Working Days /
A. Security Sentinel – Basic Level Program
The basic level course is suitable for individuals who handle sensitive data in any vertical of an organisation. These may be managers or equivalent personnel and may or may not be from IT / security background. However, it is essential these days that these individuals have basic knowledge as well as the requisite skills to implement standard cyber security controls to combat the modern day attacks.
On completion, the participants would acquire the skills to harden their windows based machines right from the operating system level to the commonly used applications being used. They will gain visibility into the various attack vectors in a LAN environment and would be made aware of techniques to remain secure while surfing the web. An overview of wi-fi and mobile security including an understanding of the IT act is also a part of the curriculum to ensure that the participants get an overall understanding of the security domain.
Module 1 – Cyber Security Overview
Module 2 – Windows Hardening
Module 3 – Vulnerabilities and Threats
Module 4 – Application hardening and Security
Module 5 – Network Security
Module 6 – Social Engineering
Module 7 – Wireless Security
Module 8 – Mobile Security
Module 9 – IT Act
Module 10 – Audit, Compliance and Standards
It is a hands on course and all participants are expected to get their personal laptops with a min specs with CPU: i3 and above, RAM: 4 GB and above.
B. Security Sentinel Intermediate Level Program
As ‘’Offense is the best form of Defence’’, this course helps the participants in imbibing the skills of an ethical hacker. These skills are essential as only after learning the techniques being employed by the real hackers, can one effectively assess their organisation’s own security posture.
The intermediate level Security Sentinel course is well suited for individuals who handle sensitive IT networks and have a couple of years of IT / cyber security experience. They must have basic knowledge of networking protocols and security fundamentals. While undergoing this training program the participants would be given ample hands on exercises on simulated network environments and access to latest hacking tools to practice all the steps of the ethical hacking cycle from Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks. The course is modelled using a cyber-range thereby helping the participants acquire the skills in addition to the knowledge and understanding of the security domain.
Course Outline :
Module 1 – Security Fundamentals
Module 9 – Hacking UNIX/Linux Module 2 – Information Gathering Module 10 – Exploitation Techniques Module 3 – Detecting Live Systems Module 11 – Pen Testing Wireless Networks Module 4 – Enumeration Module 12 – Networks, Sniffing, and IDS Module 5 – Exploitation Techniques Module 13 – Injecting the Database Module 6 – Vulnerability Assessments Module 14 – Attacking Web Technologies Module 7 – Malware Goes Undercover Module 15 – Project Documentation Module 8 – Windows hacking Module 16 – Pen Testing w/Power-shell
- It is a hands on course and all participants are expected to get their personal laptops with a min specs of i3 processor and 4 GB of RAM.
C. Security Sentinel Advance Level Program
The advance level course is suitable for individuals who handle sensitive IT networks data centers, server farms security operational centers etc. It is understood that they have adequate experience in handling security incidents. They must have good knowledge of networking and security protocols and have basic knowledge of ethical hacking methodology.
This course helps the participants acquire the finer points of being a master penetration tester thereby being able to respond to vicious modern day attacks like DDOS, APT, ransomware etc. They will be able to practice on complex simulated networked environments alive with high volume of business traffic and the standard perimeter security framework all of which would be created on a state of the art cyber-range. This hyper real environment would be attacked by using advanced Kali Linux tools, Metaspolit framework and other custom techniques and tools. The course would also include modules on web application attacks, bypassing firewalls and anti-virus applications.
This would give a thorough understanding of the pen test technique enabling the participants to acquire the skill of an offensive security professional and confidently fine tune their organisations security posture.
Course Outline :
Module 1: Penetration Testing Fundamentals
Module 9: Buffer Overflow in Linux Module 2: Deep Dive into Kali Linux Module 10: Privilege Escalation Module 3: My basic Tool Kit Module 11: Client Side Attacks Module 4: Passive snooping Module 12: Web Application Attacks Module 5: Active snooping Module 13: Port Redirection and Tunneling Module 6: Fine tune the VA process Module 14: Understanding the Metasploit Framework Module 7: Start with Exploits Module 15: Bypassing Firewalls and Antivirus Module 8: Buffer Overflows Module 16: Final Reporting and Compliance