#Need for Cyber Security Training
#Benefits of The CCSS Program
Training conducted by India's top cyber security services company
Learn from professionals with 10 + years of practical experience.
Vendor based hands on training with certifcation.
100% Placement
Soft Skills & Personality development training.
Future opportunity to earn Rs 1 Cr+ salary per Annum.
#CCSS Content
Classroom
- Network Module
- Security Fundamentals Module
- Enterprise Security Module
- Introduction to VAPT
Hands-on
- Endpoint Security
- Cloud Security
- Network Security
- Data Security
#CCSS Structure
Month 1
Classroom Training from Basic to Advance Level
Month 2
Hands on Training on Technologies from World Class Vendors
#CCSS Curriculum
Course Content for First Month Classroom Training
-
Network Module (28 Hours)
- Basics of Networking and Networking Devices
- Introduction to Network Models (OSI and TCP/IP)
- Understanding IPv4 Addressing Scheme
- Routing and Routing Protocols
- Switching and related concepts
- Virtual LAN (VLAN) Concept and Configuration
- Understanding Security on Networking Devices & Access Control List (ACL)
- Basics of Troubleshooting Network Configuration & Devices
- Domain Name System (DNS)
- Network Address Translation (NAT)
- Virtual Private Network (VPN)
-
Security Fundamentals Module (12 Hours)
- Introduction to the Concept of Security
- Principles of Security
- Types of Attacks
- Cryptography
- Public Key Infrastructure (PKI)
- Internet Security Protocols
- Security Standards
-
Enterprise Security Module (24 Hours)
- Concepts
- Defense-in-Depth Strategy
- Principle of Least Privilege
- Separation of Duties
- Zero Trust
- Risk Assessment & Management
- Endpoint Security
- Encryption
- Antivirus
- Antimalware
- Firewalls
- Intrusion Detection / Prevention System
- Data Loss Prevention (DLP)
- Patch Management
- Active Directory (AD)
- Access Control
- Authentication, Authorization, and Accounting (AAA)
- Backup & Disaster Recovery
- Firewalls
- Threat Intelligence
- Advanced Persistent Threat (APT)
- Security Operation Center (SOC)
- Security Information & Event Management (SIEM)
- Security Orchestration, Automation and Response (SOAR)
- Forensics Analytics
- User Behaviour Analytics
- Threat Intel Platform
- Vulnerability Management
- Mobile Device Management
- Application Security (SAST/DAST)
- Web Application Firewall (WAF)
- Database Activity Monitoring (DAM)
- Introduction to Cloud Computing
- Cloud Security
-
Introduction to Vulnerability Assessment & Penetration Testing (16 Hours)
- Introduction to Linux
- Concepts related to Ethical Hacking
- Malwares and their types
- Threats, Vulnerabilities & Attacks
- Wireless Security
- Understanding OWASP Top 10 Vulnerabilities
- Phases of Attack
- The Reconnaissance Phase
- The Scanning Phase
- The Gaining Access Phase
- The Maintaining Access Phase
- The Covering of Tracks Phase
- Attack Frameworks / Models
#HTD (Hire-Train-Deploy) Module
Get offer letter before joining the course!
Enrollment process:
Step 1: Interested candidates register with Meta Infotech for an aptitude test, followed by an interview.
Step 2: Only shortlisted candidates will be allowed to enroll in the course and will receive a conditional offer letter.
Step 3: Pay the course fees to confirm admission.
Step 4: Upon successfully completing the course and meeting all technical requirements, students will join Meta Infotech as employees.