Enroll Now

Online TrainingOnline Training

Corporate TrainingCorporate Training

Course On DemandClassroom


Introduction To Cyber Security

  • Fundamentals Of Information Security
  • Threats, Attack Categories & Hacking
  • Cyber Security Controls
  • Introduction To Network Security
  • Introduction To Idam
  • Introduction To Cyber Forensics
  • Introduction To Application Security
  • Introduction To Data, Data Centre And Cloud Security


  • Basics Of Cryptography
  • Des And Aes
  • The Rsa Algorithm
  • Hash Function
  • Some Cryptographic Tools
  • Application Of Cryptography

Network Security

  • Networks And Their Vulnerabilities
  • Network Security Measures
  • Intrusion Detection & Prevention System
  • Implementation Of A Firewall
  • Security Information And Event Management (Siem)

Application Security

  • Identifying Application Security Risks
  • Countermeasures
  • Owasp Top 10

Security Auditing

  • Audit Planning (Scope, Pre-audit Planning, Data Gathering, Audit Risk)
  • Risk Analysis
  • Phase Approach – Risk Assessment

Cyber Forensics

  • First Response
  • Forensic Duplication
  • Standard Operating Procedures For Disk Forensics
  • Mobile And Cdr Forensics

New Topics Added Considering Current Industry Requirements:

  • secure Sdlc
  • Identity-aaa Architecture
  • While Covering Phishing Attacks, Vishing And Smishing To Be Added
  • Cyber Kill Chain Methodology
  • Vulnerability Assessment Process-this Should Be Accompanies With Lab Exercises
  • Digital Certificate, Self-signed Certificate, Single Sign-on
  • New Types Of Attacks And Their Methodologies
  • Challenge Response Protocol
  • Siem Design And Implementation
  • Software Defined Network And Its Usage In Current Security Architecture

United Global Soft Key Features

Expert Instructors

Practical Implementation

Real- time Case Studies

Certification Guidance

Resume Preparation

Placement Assistance

Copyright 2018 © www.unitedglobalsoft.com . All right reserved | Sitemap | Privacy Policy | Terms Of Services