Advanced Cybersecurity

Advanced cybersecurity involves employing cutting-edge technologies and methodologies to safeguard digital assets against sophisticated cyber threats, ensuring robust defense mechanisms and proactive threat detection.

127 lessons

Lifetime access

Access Online

Certificate of Completion

Course Price:

17999

What you will learn:

Principles in Security Design

Standards - ISMS and ISO 27001

KPI Design and reporting

Auditing Concepts including auditing ISMS

internal audit etc

Auditing Vendors and Third Parties

Data Classification

Access Control Lists

Segregation of Duties

Cryptography & Encryption

Incident Management

Response

AV

malware

ransomware

Log Management

Requirements:

Fundamentsls of cybersecurity

Description:

Advanced cybersecurity refers to a comprehensive approach to protecting digital systems, networks, and data from highly sophisticated cyber threats. It involves deploying advanced technologies such as artificial intelligence, machine learning, behavioral analytics, and encryption to detect, prevent, and respond to cyber attacks effectively. Additionally, advanced cybersecurity emphasizes continuous monitoring, threat intelligence sharing, and proactive measures to stay ahead of evolving cyber threats and mitigate risks effectively. This approach involves a combination of technical expertise, strategic planning, and ongoing innovation to safeguard critical information assets in today's rapidly evolving digital landscape.

Your Tutor

Dinesh Bareja

Dinesh Bareja

Dinesh Bareja is a highly experienced Lead Consultant in the IT domain, with over 15 years of expertise in Strategy, Quality, Risk, Information Security, Compliance, and Governance. He is a recognized thought leader in Cybersecurity, Risk, Cybercrime, and Cyber Intelligence domains, and is considered one of the pioneers in Internet and Cybersecurity in the country. Dinesh's main focus is on delivery and management of ISO and related projects across all sectors. He provides Business Consulting & Advisory services for IT/IS Strategy, Architecture, Design, and Resilience, Government Policy, Cybercrime and Security, Cyber Insurance Advisory, Forensic Investigation & Response, Enterprise Risk Management, Training, and Awareness. Dinesh has worked on several policy development and set up cyber defence and research centers for State Governments. He has also been responsible for governance, security implementation, and security maturity assessments at various organizations in India, Canada, the Middle East, and Africa. He has been in advisory positions with various government, public and private organizations for cyber security, assisting in strategy development, operations risk evaluation, and policy development. As a management professional with keen insight for Cybersecurity and addressing new age risks, Dinesh has established practices for one of a kind new services for Forensic & Incident Response, Cyber Insurance Advisory, Current State Risk Assessment and Maturity, Cyber Threat and Forensic Response. Dinesh is a Microsoft Certified Systems Engineer and a Certified Information Systems Security Professional (CISSP) with a strong academic background in computer science. His experience, skills, and thought leadership make him a valuable asset to any organization in need of expert advice and guidance in Cybersecurity and related domains.

Course Content

Module 1 (14 lessons)

Revision of Fundamental learnings

video
14:58

Principles in Security Design (Defence in depth DevSecOps)

video
26:10

Standards - ISMS and ISO 27001 - the fundamental building block of IS/CE Part6

video
35:19

Standards - ISMS and ISO 27001 - the fundamental building block of IS/CE Part1

video
36:38

Standards - ISMS and ISO 27001 - the fundamental building block of IS/CE Part2

video
36:28

Standards - ISMS and ISO 27001 - the fundamental building block of IS/CE Part3

video
35:33

Standards - ISMS and ISO 27001 - the fundamental building block of IS/CE Part4

video
23:16

Standards - ISMS and ISO 27001 - the fundamental building block of IS/CE Part5

video
36:44

KPI Design and reporting Part1

video
23:38

KPI Design and reporting Part2

video
30:14

KPI Design and reporting Part3

video
26:50

Standards - NIST, CIS etc

video
35:18

TEST

quiz
00:00

Assignment Module1

assignment
00:00
Module 2 (10 lessons)

Auditing Concepts including auditing ISMS, internal audit etc Part 1

video
22:23

Auditing Concepts including auditing ISMS, internal audit etc Part 2

video
15:54

Auditing Concepts including auditing ISMS, internal audit etc Part 3

video
16:09

Auditing Concepts including auditing ISMS, internal audit etc Part 4

video
15:21

Auditing Concepts including auditing ISMS, internal audit etc Part 5

video
17:53

Auditing Vendors and Third Parties Part1

video
21:09

Auditing Vendors and Third Parties Part2

video
20:07

Risk framework design, risk assessment and remediation

video
19:12

TEST

quiz
00:00

Assignment Module2

assignment
00:00
Module 3 (16 lessons)

Cryptography & Encryption - Technology Concept

video
03:07

Cryptography & Encryption - full disk encryption, database encryption Concept

video
03:15

Cryptography & Encryption - data in transit and data at rest Concept

video
03:25

Identity _ Access Management (SSO, MFA) Concept

video
03:26

Segregation of Duties Concept

video
03:40

Data Classification

video
18:15

IT Asset inventory management

video
16:44

Identity & Access Management (SSO, MFA)

video
31:06

Access Control Lists

video
43:33

Segregation of Duties

video
19:17

Cryptography & Encryption - technology

video
21:28

Cryptography & Encryption - technologies and tools

video
17:42

Cryptography & Encryption - full disk encryption, database encryption

video
19:25

Cryptography & Encryption - data in transit and data at rest

video
18:15

TEST

quiz
00:00

Assignment Module3

assignment
00:00
Module 4 (17 lessons)

Cyber Physical Security (cctv, biometrics, facial etc) Concept

video
03:20

Incidence Management, Response Concept

video
02:47

Forensics, Incident investigation and RCA Concept

video
02:54

Patch Management Concept

video
03:27

Backup Management Concept

video
03:08

Cyber-Physical Security (CCTV, Biometrics, Facial, etc) Part1

video
18:59

Cyber-Physical Security (CCTV, Biometrics, Facial, etc) Part2

video
23:17

Cyber-Physical Security (CCTV, Biometrics, Facial, etc) Part3

video
29:05

Incident Management, Response

video
17:20

Incident Management, Response-2

video
17:35

Forensics, Incident Investigation and RCA

video
20:33

Forensics, Incident Investigation and RCA-2

video
14:31

Patch Management

video
19:12

Backup Management

video
28:06

Backup management Part2

video
27:29

TEST

quiz
00:00

Assignment Module4

assignment
00:00
Module 5 (15 lessons)

AV Malware, ransomware Concept

video
03:14

Threat hunting, Threat Intelligence Concept

video
03:23

Log Management Concept

video
03:18

Drills and tests for IT operations Concept

video
03:01

Antivirus, Malware, Ransomware

video
17:17

Threat Hunting

video
29:55

Threat Hunting Part2

video
24:13

Log Management

video
20:05

Log Management Part2

video
15:37

Drills and Tests for IT Operations

video
15:04

Drills and Tests for IT Operations Part2

video
21:33

Drills and Tests for IT Operations Part3

video
16:15

Drills and Tests for IT Operations part4

video
22:47

TEST

quiz
00:00

Assignment Module5

assignment
00:00
Module 6 (14 lessons)

System Acquisition Dev and Maintenance (DevDecOps) Concept

video
03:15

VA and PT Concept

video
03:25

System Acquisition Dev and Maintenance (DevSecOps) Part1

video
15:07

System Acquisition Dev and Maintenance (DevSecOps) Part2

video
10:29

System Acquisition Dev and Maintenance (DevSecOps) Part3

video
13:28

System Acquisition Dev and Maintenance (DevSecOps) Part4

video
13:07

System Acquisition Dev and Maintenance (DevSecOps) Part5

video
14:55

System Acquisition Dev and Maintenance (DevSecOps) Part6

video
19:13

Vulnerability Assessment & Penetration Testing (VA & PT)

video
32:09

Vulnerability Assessment & Penetration Testing Part2

video
32:55

Vulnerability Assessment & Penetration Testing Part3

video
34:24

Vulnerability Assessment & Penetration Testing (VA & PT) Part3

video
33:32

TEST

quiz
00:00

Assignment Module6

assignment
00:00
Module 7 (19 lessons)

Application Security Testing Concept

video
03:28

IP addressing, DNS, IPv4, IPv6 and Protocols Concept

video
03:18

Network architecture design Concept

video
03:09

Database security Concept

video
03:20

Servers - configuration, access, hardening (windows and linux) Concept

video
03:06

Application Security Testing Part1

video
38:21

Application Security Testing Part 2

video
52:52

Application Security Testing Part 3

video
29:29

IP addressing, DNS, IPv4, IPv6, and Protocols

video
20:20

Network Architecture Design

video
16:49

Network Security Principles

video
15:58

Database Security Part1

video
35:05

Database Security Part2

video
22:34

Servers - Configuration, access, hardening (Windows and Linux) Part1

video
20:04

Servers - Configuration, access, hardening (Windows and Linux) Part2

video
20:01

Servers - Configuration, access, hardening (Windows and Linux) Part3

video
19:48

Network Security principles Concept

video
02:44

TEST

quiz
00:00

Assignment Module7

assignment
00:00
Module 8 (21 lessons)

Threat Modeling Concept

video
03:08

Vendor Risk Management - principles and practices Concept

video
02:59

Vendor Risk Management - Vendor Auditing Concept

video
03:14

SOC Setup and Operations Concept

video
03:24

SIEM - Information Security Incident Management Concept

video
02:41

Disaster Recovery and Crisis Mgt Concept

video
03:08

Threat Modeling

video
17:04

Vendor Risk Management - Principles and Practices

video
18:34

Vendor Risk Management - Regulatory Requirements

video
13:24

SOC Setup and Operations Part1

video
16:29

SOC Setup and Operations Part2

video
10:18

SOC Setup and Operations - SOC Ops and IR

video
17:45

SOC Setup and Operations Part2

video
22:03

Security Operations Center(SOC) Setup and operations Part3

video
22:20

SIEM - Information Security Incident Management

video
28:35

Disaster Recovery and Crisis Management

video
19:52

Disaster Recovery and Crisis Management Part2

video
16:56

Disaster Recovery and Crisis Management Part3

video
15:47

Vendor Risk Management - Vendor Auditing

video
18:29

TEST

quiz
00:00

Assignment Module8

assignment
00:00
Final Certification Examination (1 lessons)

Final Cerfication Examination

quiz
00:00