• Introduction to cyber security
• Cryptography
• Computer Security
• Data and End Point Security
• Cloud Security
• Phases of a cyber Attack
Enhanced devices and network throws and active threats of alien agents to compromise the security, this is where network security comes to play. It secures both network and hardware and also controls its access to approved parties.
• IT security professional
• Cyber expert
• Network security specialist
• Cyber security trainer
No mandatory pre requisites are there for joining this course. Any aspirants with interest in networking are engaged to join for this course.
1 ½ months ( 40 hours)