Table of Content
 

 

Cyber Technology

  • Networking
  • Wireless LAN Basics
  • Web Basics
  • Website
  • Information Security Principles
  • Cryptography
  • Public Key Infrastructure
  • Electronic Signature
  • Access Management
  • User Access Management
  • Cloud Computing

Cyber Ethics

  • Privacy
  • License, Trademark and Copyright
  • Intellectual Property
  • Freedom of Speech
  • Hacking
  • Internet Fraud

Cyber Crimes

  • Cyber Crimes
  • Cyber Criminals Types
  • Cyber Crime Motives
  • Psychological Profiling
  • Sociology of Cyber Criminals
  • Social Engineering
  • Cyber Stalking
  • Botnets
  • Attack Vector
  • Malware
  • Phishing
  • Identity Theft (ID Theft)
  • Cyber Terrorism

Cyber Crime Techniques

  • Proxy Servers and Anonymizers
  • Password Cracking
  • Keyloggers and Spywares
  • Worms
  • Trojan Horse
  • Steganography
  • DoS and DDoS Attacks
  • SQL Injection
  • Buffer Overflow
  • Reverse Engineering
  • Vulnerability Research
  • Network Attacks
  • WLAN Hacking
  • Web Server Attacks
  • VoIP Hacking & Countermeasures
  • SMS Forging

Prevention and Protection

  • Business Continuity
  • Disaster Recovery
  • System Backup
  • Security Assessments
  • Penetration Testing
  • Security Testing Tools
  • Monitoring
  • Intrusion Detection and Prevention
  • Vulnerability Assessment (VA)
  • Secure Coding
  • Incident Management
  • Risk Management

Cyber Forensics

  • Forensic Activities
  • Forensic Technologies
  • Chain of Custody Concept
  • Digital Forensics Life Cycle
  • Digital Forensics Tools
  • Forensics Analysis of E-Mail
  • Network Forensics
  • Computer Forensics and Steganography
  • Forensics and Social Media
  • Mobile Forensics
  • Computer Forensic Lab
  • Computer Forensic Team

Cyber Crime Investigation

  • Cyber Crime Investigation Basics
  • Pre-Investigation Technical Assessment
  • Detection and Containment
  • Digital Evidence Collection
  • Evidence Preservation
  • Evidentiary Reporting
  • Investigating Phishing Cases
  • Investigating Cyber Pornography Crimes
  • Investigating Credit Card Fraud Cases

Cyber Law

  • IT Act
  • International Cyberspace Laws
  • Other Law and Policy Agencies

Apply for Certification

https://www.vskills.in/certification/Cyber-Security-Certification