Signup as a Tutor

As a tutor you can connect with more than a million students and grow your network.

"Cyber Security & Ethical Hacking" is no longer available

No Reviews Yet

Madhapur, Hyderabad

Course ID: 37448

Madhapur, Hyderabad

No Reviews Yet

About the Course

Course Description

The Cybersecurity Fundamentals Online Course will provide learners with principles of data and technology that frame and define cybersecurity. Learners will gain insight into the importance of cybersecurity and the integral role of cybersecurity professionals. The interactive, self-guided format will provide a dynamic learning experience where users can explore foundational cybersecurity principles, security architecture, risk management, attacks, incidents, and emerging IT and IS technologies.

 Learning Objectives:

  • Identify the key components of cybersecurity network architecture

  • Apply cybersecurity architecture principles

  • Describe risk management processes and practices

  • Identify security tools and hardening techniques

  • Distinguish system and application security threats and vulnerabilities

  • Describe different classes of attacks

  • Define types of incidents including categories, responses and timelines for response

  • Describe new and emerging IT and IS technologies

  • Analyze threats and risks within context of the cybersecurity architecture

  • Appraise cybersecurity incidents to apply appropriate response

  • Evaluate decision making outcomes of cybersecurity scenarios

  • Access additional external resources to supplement knowledge of cybersecurity


It is recommended that you have basic understanding on following concepts prior to attending the training session;

  • OSI model

  • TCP/IP

  • General firewall features, types, issues, and platforms

  • Networking (i.e. ports, protocols, VPNs, etc.).

  • Application security, Risk assessments

  • BYOD

Target Audience :

  • Zero to three years cybersecurity experience

  • Students and recent grads

Course Outline 

  1. Introduction to Cyber security

  2. Cyber security objectives

  3. Cyber security roles

  4. Differences between Information Security & Cyber security

  5. Cyber security Principles

  6. Confidentiality, integrity, & availability

  7. Authentication & nonrepudiation

  8. Information Security (IS) within Lifecycle Management

  9. Lifecycle management landscape

  10. Security architecture processes

  11. Security architecture tools

  12. Intermediate lifecycle management concepts

  13. Risks & Vulnerabilities

  14. Basics of risk management

  15. Operational threat environments

  16. Classes of attacks

  17. Incident Response

  18. Incident categories

  19. Incident response

  20. Incident recovery

  21. Future Implications & Evolving Technologies

  22. New & emerging IT & IS technologies

  23. Mobile security issues, risks, & vulnerabilities

  24. Cloud concepts around data & collaboration

Date and Time

Not decided yet.

About the Trainer

5 Avg Rating

5 Reviews

6 Students

1 Courses

Vinod Babu

Certified ECCOUNCIL Trainer, Microsoft Certified Trainer, Certified Ethical Hacker, Certified Hacking Forensics Investigator

Key Skills:
Network & System Security.
Risk Management.
Vulnerability Assessments.
Authentication & Access Control
System Monitoring.
Regulatory Compliance.
System Integration Planning.
Multitier Network Architectures.


Cyber Security/ InfoSec specialist with qualifications include Master’s degree in computer science; CEH, CHFI, MCSA, MCP, CCNA and CEI certifications and detailed knowledge of security tools, technologies and best practices. Sixteen (16) years of experience in the creation and deployment of solutions protecting networks, systems and information assets for diverse companies and organizations.

Certified Ethical Hacker –CEH.
Certified Hacking Forensic Investigator – CHFI.
Certified EC-Council Instructor – CEI.
Microsoft - MCSA
Microsoft – MCP
Cisco – CCNA

Offensive InfoSec Technologies:

Security Technologies: Ethical Hacking, Forensic Investigation, Cloud Computing Threats, Advanced Persistent Attack, Virus and Worms Attack, Mobile Threats, Botnet, Insider Attack. Network/Host/Applications Threats, Mis-configuration attacks, Shrink Wrap Codes, Black box and White box testing.

Network Defense, IDS and IPS, Content Filtering, Anti-spyware, SSH, SSL, Digital Certificates, Anti-Virus/Malware/Adware tools.

Operating Systems: Ubuntu, Centos, OpenSuse, Redhat Linux, Windows Server 2012, Messaging, Window 10,8,7, MAC OSX Sierra.

Networking: Managed switches & Routers configuration of Cisco, HP, Siemens, Ericsson, Dell and Cajun deployed for LANs, WANs, VPNs, TCP/IP configurations and routing protocols. Sonic wall / Fortigate / Watch guard Firewalls configurations. Network security: traffic/protocol analysis, firewalls, IDS /IPS, routers, switches, wireless (802.11), and host hardening.

Secure network engineering, management, and monitoring, including 802.11 networks.

Pen testing & Security Tools:
Kali Linux, Windows Forensic Investigation Tools, Nmap, Burp Suite, Fluxion, Megaspoilt, Wireshark and Packetyzer.

IT Experience

Technoprenuer - IT Security Consultant and InfoSec Trainer. – 2010 to Till date.

From 2004 to 2010 worked with various companies as consultant and SME Technocrat at various levels in companies Globalcom , iGate Global Solutions, Tanla Solutions Ltd, Brigade Technologies Pvt Ltd, Taksheel Solutions Ltd.

Summary Of Experience :

More than 15 years of experience in IT Network, System, Security and communication engineering, project management and working IT experience in complex public- and private-sector environments. Outstanding knowledge in the industry, Committed to staying abreast of and advancing leading-edge technology. Strengths include know-how to build effective redundancies into systems. Driven problem-solver with demonstrated ability to successfully lead network and systems engineering projects.

• Host, System, Network, Application level penetration testing and incident response.
• Design and Teach Security courses internationally (e.g., Ethical Hacking, IPv6) with superior analytical and troubleshooting ability.
• Cyber exercise design and delivery, Networking/information security laboratories (face-to-face, virtual), Information systems architecture, integration, project management.
• Network Protocol/traffic analysis, Firewall (Cisco PIX/ASA, pfSense, IP-tables) engineering, implementation, and administration, Networking at Layers 2-4 and 7 (including all major TCP/IP protocols).
• Intrusion Detection/Prevention Systems (IDS/IPS) engineering, implementation, and administration, Networking hardware (routers and switches).

• Engineering, implementation, and administration of Windows/Linux/UNIX (OS X, Redhat/Ubuntu/centos) server platform including hardening and security fine-tuning.

Expertise in Cyber Security:

Define, maintain and enforce application security best practices and demonstrate vulnerabilities to application/system owners, and provide solutions for risk mitigation.
• Expert in Application Security testing for Web, client Server application to assess the vulnerabilities including manual and automated testing of Application
• Strong skills in conducting white, black , grey box testing
• Inspection and Certification ability on security controls as per Open Source Security Testing Methodology Manual (OSSTMM), OWASP, SANS
• All trainings shall be based on the real time Proof-of-concept (PoC) for better understanding.
• Review and identifying the flaws in source code of different applications through manual and automation process.
• Monitoring and track progress of vulnerabilities found and maintain the history of system.
• Providing detailed information in the form of reports on each and every issue that are important in suggested monitoring and scanning on applications and systems.
• Strong knowledge and complete understanding of potential attack vectors like XSS, injection, session hijacking, and social engineering.
• Sound knowledge on cryptographic primitives and its principles.
• Realtime knowledge and solid understanding on OSImodel and networking protocols, such as TCP/IP.
• Thorough understanding of HTTP and HTTPS, as well as their underlying implementations.
• Realtime experience in delivering security testing and ethical hacking modules like CEH, CHFI, ECSA, Penetration Testing, OWASP.
• Experience developing custom tools and/or scripts to accomplish desired goals. Proficiency with industry standard exploitation, forensic frameworks and the aptitude to research and stay up-to-date with current exploits.
• Successfully delivered trainings on various hacking attacks and threats to the cloud computing technology and also provided security remedies to counter cloud computing threats and attacks.
• In-depth knowledge on pen testing techniques to identify threats in cloud systems.
• Explore Heart bleed CVE-2014-0160, Shellshock CVE-2014-6271 and Poodle CVE-2014-3566
• Hacking and security threats to mobile phones and how a mobile phone can be attacked and its remedial measures.
• Keep upto date on recent, upcoming security and threats and its impact such as latest virus, Trojan and Back doors.
• Strong knowledge on IT security controls, laws and standards of India and Federal Laws of USA.

Training On Ethical Hacking :

“Learning the ideaology and approach behind any cyber crime is a vital part of defensive strategy ..BVB ”

To learn what and how to hack is equally important for information security professionals, this knowledge shall enable all possible security practices in finding and fixing security vulnerabilities such as methods used by blackhats “hackers” for penetration into networks and systems ,this shall enable the security professional to provide preemptive solutions. IT networks are fenced with tight security systems built on top of network and systems level security methods, but as evident many times “rat finds its way to cheese” similar to that blackhats improve and develop new methods for penetration into IT networks.

Learning ethical hacking is keeps abreast on checking for vulnerabilities in and around security fence to reinforce the weak areas and create a shield.

The training covers the important offensive methods, below image illustrates Phases and Steps of Ethical Hacking.


No reviews currently Be the First to Review


Post your requirement and let us connect you with best possible matches for Ethical Hacking Training Post your requirement now is India's largest network of most trusted tutors and institutes. Over 25 lakh students rely on, to fulfill their learning requirements across 1,000+ categories. Using, parents, and students can compare multiple Tutors and Institutes and choose the one that best suits their requirements. More than 6.5 lakh verified Tutors and Institutes are helping millions of students every day and growing their tutoring business on Whether you are looking for a tutor to learn mathematics, a German language trainer to brush up your German language skills or an institute to upgrade your IT skills, we have got the best selection of Tutors and Training Institutes for you. Read more