Course Provider
What will you learn in this course?
This course provides students with an introduction to Cybersecurity and covers the concepts, terms, and patterns of Cybersecurity technologies, processes, procedures and software solution. After completing this course, students will be able to identify and articulate Cyber security aspects across a broad spectrum of industries.
Foundations of Cybersecurity Program (FOUNDSCSP100)
-
Skill Type
Emerging Tech
- Domain
cyber security
- Course Category
Foundation course
- Certificate Earned Joint Co-Branded Participation Certificate
- Nasscom Assessment Available
- Course Covered under GoI Incentive
Yes
-
- Course Price
INR 5,999
- Course Duration
45 Hours
- Course Price
Why should you take this course?
In this course, you will learn the many technologies that prepare you for a career working with Cybersecurity systems. You will be exposed to security fundamentals, how to recognize and defend yourself agains some of the most common cybersecurity threats. In addition, you will learn how to be part of the critical response team and response planning.
Who should take this course?
This course is intended for those who want to gain a foundational knowhow on different aspects of Cyber Security and become eligible for other NASSCOM Cybersecurity certifications.
Curriculum
This foundational program consists of nine individual courses
- Enterprise Security Fundamentals
- Threat Detection: Planning for a Secure Enterprise
- Planning a Security Incident Response
- PowerShell Security Best Practices
- Managing Identity
- Securing Data in Azure and SQL Server
- Windows 10 Security Features
- Windows Server 2016 Security Features
- Microsoft Azure Security Services
Tools you will learn in this course:
- Azure
- SQL Server Management Studio
- Powershell
FAQs
A security incident response is a planned and organized response to a security breach or cyber-attack. The objective of a security incident response is to limit the damage that has been caused, or may be caused, as a result of such a breach. It must also seek to reduce the time it takes to recover from the incident and limit the costs as much as possible.