scorecardresearch
Naukri Learning > cyber security

Refine Results

Course Level

Mode of learning

Category

IT & Telecom

Banking, Finance & Analytics

BPO, Operations & Engineering

Human Resources & Administration

Executive Programs

Marketing

Masters Courses & MBA

Others

Leadership & Management

Design

"cyber security" courses, certification and training

  1. The Complete Cyber Security Course : Network Security!

    Become a cyber security specialist. After this course, you will be able to discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability scanning . You will be able to architect your network for maximum security and prevent local and remote attacks. We also cover the use of custom router firmware to provide you with better network security services. You will understand the various types of firewalls that are available and what threats each help mitigate. Including layer 4 firewalls like Iptables on Linux and PF on MacOS and BSD. Virtual firewalls, host-based firewalls and application based firewalls like Pfsence. We cover firewalls on all platforms including Windows, Mac OS X and Linux for all types of use scenarios. We explore in detail wireless security, the configurations that are required for maximum security and why. How Wi-Fi is hacked and how to mitigate those attacks. Covering everything from encryption weaknesses to evil twins, RF isolation, and Wi-Fi crackers. You will master network monitoring to discover and identify potential hackers , malware and other adversaries that might be lurking on your network. Using tools like Wireshark , Tcpdump and Syslog. We then move away from network security and onto the details of how we are tracked online by corporations, nation-states your ISP and others. You will understand the techniques used like zombie super cookies, browser fingerprinting and how browser profiling works so third parties can establish who you are online. We look at search engine privacy - and how to mitigate the tracking and privacy issues of search engines and their associated services. Browser security - We cover one of the largest risks online, the browser. The doorway into your system. How to best reduce the attack surface of the browser and harden it for maximum security and privacy. A critical consideration for reducing your risk. Finally you will fully understand how to best use methods of authentication including passwords and multi-factor authentication - soft tokens and hard tokens . The best password managers to use and why. How passwords are cracked, and how to mitigate the cracking. This is volume 2 of 4 of your complete guide to cyber security privacy and anonymity.

    Online self studyIntermediate
    Enquire Now

    Cyber Security, Network Security, IOT,

    Offered by:  UDEMY
  2. The Complete Cyber Security Course : Anonymous Browsing!

    Learn a practical skill-set in staying anonymous online and maintaining total privacy against even a well-resourced adversary with global influence. Covering all major platforms including Windows, MacOS, Linux. iOS and Android . Plus Tails, Whonix, and others. Become a cyber security specialist. - Go from beginner to expert in this easy to follow advanced course. We cover in detail all the best anonymising and privacy methods . Including; Tor, VPNs - Virtual Private Networks, Proxy servers - HTTP, HTTPS, SOCKs and WebSSH, Secure Shell, Live Operating Systems - Tails, Knoppix, Puppy Linux, Jondo live, Tiny Core Linux OPSEC - Operation Security I2P - The Invisible Internet Project JonDoNym Off-site connections - Hotspots and Cafes Mobile, Cell Phones & Cellular NetworksBulletproof hosting and more.... For each of these anonymizing methods we analysis in detail their strengths and weaknesses , we look at the techniques used to attack these anonymity services and what you can do to mitigate those de-anonymization attack s . Advanced anonymity : We explore chaining and nesting anonymizing services together to provide layers of obfuscation for maximum anonymity against even the most well-resourced adversaries. We cover bypassing censors, firewalls, and proxies . Learn to bypass the trickiest of censoring devices including DPI (deep packet inspection). The course covers both the theory and practically how setup everything we discuss. This is volume 3 of 4 of your complete guide to cyber security privacy and anonymity.

    Online self studyIntermediate
    Enquire Now

    Cyber Security,

    Offered by:  UDEMY
  3. Vskills Certified Cyber Security Analyst Government Certification

    This certification institutes & enhances awareness of aspirants as per the company need for cyber security and forensics. Knowledge acquired by the certification includes cybercrime, IT Act 2000, cyber offenses, wireless devices cybercrime, phishing, keyloggers, backdoors, SQL injection, DDoS attacks, identity theft, computer and wireless forensics, cyber terrorism, social media marketing, incident handling and privacy.

    Offered by:  VSkills
  4. The Complete Cyber Security Course : Hackers Exposed!

    Become a Cyber Security Specialist - Go from a beginner to advanced in this easy to follow expert course. Covering all major platforms - Windows 7, Windows 8, Windows 10, MacOS and Linux. This course covers the fundamental building blocks of your required skill set - You will understand the threat and vulnerability landscape through threat modeling and risk assessments. We explore the Darknet and mindset of the cyber criminal. Covering malware, exploit kits, phishing, zero-day vulnerabilities and much more. You will learn about the global tracking and hacking infrastructures that nation states run. Covering the NSA, FBI, CIA, GCHQ, China’s MSS and other intelligence agencies capabilities. You will understand the foundations of operating system security and privacy functionality. A close look at the new Windows 10 privacy issues and how to best mitigate them.

    12 hoursOnline self studyBeginner
    Enquire Now

    Cyber Security

    Offered by:  UDEMY
  5. Cyber Security Operations (Cisco)

    Cyber security is rapidly evolving, and professionals must keep up-to-date with the complexities of different cyber threats, as well as the different technologies under attack.On this microcredential, you’ll learn how cyber security professionals respond to an imminent, active or recent cyber threat. You’ll explore how to go about resolving attacks and how to complete legal investigations of any potential cybercrime.You’ll develop skills in this exciting area using up-to-date experience from the internationally recognised Cisco CCNA Cyber Security operations certification.

    Online self studyIntermediate
    ₹ 58,006 Enquire Now

    CCNA, Cyber Security, Operations

    Offered by:  Future Learn
  6. PG Certificate in Information and Cyber Security

    N L Dalmia Institute of Management Studies & Research offers the first of it’s kind in India –6 months post-graduation certificate in Information and Cyber Security | The course divided into three stages, gives the students a unique opportunity to develop their careers in ethical hacking and cyber security. The course is a perfect fit for students with a strong engineering/sciences background in computer sciences and information technology. The course would holistically cover everything right from the basics of penetration testing to cyber laws.

    Brochure
    Offered by:  N.L.Dalmia
  7. The Complete Cyber Security Course : End Point Protection

    Master the selection and implementation of solid disk encryption technology to protect devices from disk decryption attacks. Understand the current and next generation anti-virus solutions, how they work, how to select the best products and how to implement them successfully. Covering traditional end-point-protection technologies through to next generation and future technology; application control, execution prevention, machine learning and Artificial Intelligence.

    17 hoursOnline self studyIntermediate
    Enquire Now

    Machine Learning

    Offered by:  UDEMY
  8. The Complete Cyber Security Course: Network Security

    After this course, you will be able to discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability scanning. You will be able to architect your network for maximum security and prevent local and remote attacks. We also cover the use of custom router firmware to provide you with better network security services. You will understand the various types of firewalls that are available and what threats each help mitigate.

    13 hoursOnline self studyBeginner
    Enquire Now

    Network Security

    Offered by:  UDEMY
  9. Cyber Security Awareness: Security Overview

    If you're someone who uses technology and has concerns about your digital security then this course, Cyber Security Awareness: Security Overview, is a great course for you. In this course, we will first cover different areas that are top priorities for security organizations. Then we will look at where threats are coming from in our current global environment before finally looking at the reality of cyber attacks in our current global environment.

    1 hourOnline self studyBeginner
    Enquire Now

    Digital, Cyber Security

    Offered by:  Plural sight
  10. The Complete Cyber Security Course : Anonymous Browsing

    Learn a practical skill-set in staying anonymous online and maintaining total privacy against even a well-resourced adversary with global influence. | Covering all major platforms including Windows, MacOS, Linux. iOS and Android. Plus Tails, Whonix, and others.

    14 hoursOnline self studyIntermediate
    Enquire Now

    Offered by:  UDEMY
  11. Cyber Security For Normal People: Protect Yourself Online

    This course outlines a step-by-step roadmap that you can follow to build a tight wall of security around your digital life.

    Online self studyIntermediate
    $ 39 Take this Course

    Digital,

    Offered by:  Eduonix
  12. Cyber Security Economics

    This economics course provides an introduction to the field of cybersecurity through the lens of economic principles. Delivered by four leading research teams, it will provide you with the economic concepts, measurement approaches and data analytics to make better security and IT decisions, as well as understand the forces that shape the security decisions of other actors in the ecosystem of information goods and services. | Systems often fail because the organizations that defend them do not bear the full costs of failure. In order to solve the problems of growing vulnerability to computer hackers and increasing crime, solutions must coherently allocate responsibilities and liabilities so that the parties in a position to fix problems have an incentive to do so. This requires a technical comprehension of security threats combined with an economic perspective to uncover the strategies employed by cyber hackers, attackers and defenders.

    Online self studyBeginner
    ₹ 3,573 Enquire Now

    Information Security

    Offered by:  edX
  13. Cyber-Physical Systems Security

    This course provides an introduction to security issues relating to various cyber-physical systems including industrial control systems and those considered critical infrastructure systems.

    Offered by:  UDACITY
  14. Enterprise and Infrastructure Security

    This course introduces a series of advanced and current topics in cyber security, many of which are especially relevant in modern enterprise and infrastructure settings. The basics of enterprise compliance frameworks are provided with introduction to NIST and PCI. Hybrid cloud architectures are shown to provide an opportunity to fix many of the security weaknesses in modern perimeter local area networks. | Emerging security issues in blockchain, blinding algorithms, Internet of Things (IoT), and critical infrastructure protection are also described for learners in the context of cyber risk. Mobile security and cloud security hyper-resilience approaches are also introduced. The course completes with some practical advice for learners on how to plan careers in cyber security.

    9 hoursOnline self studyIntermediate
    ₹ 3,516 Enquire Now

    Cyber Security, Internet of Things, IOT,

    Offered by:  Coursera
  15. CISSP (Online Classroom - Flexi Pass)

    Certified Information Systems Security Professional (CISSP) training facilitates the learning and knowledge in designing, building, and maintaining a secure business environment using globally approved Information Security standards. The aim of the course is to develop expertise in architecture, and design of security and earn the 30 CPEs required for the CISSP certification exam. IT Security professionals such as Security Consultants and Managers, IT Directors and Managers, and Security Auditors and Architects are best suited for this course enhancing their skills and knowledge on business continuity planning & disaster recovery planning vital for the smooth running of any organization

    5558 Students
    Offered by:  Simplilearn
Show Courses in Table
CompareRemove All
Browse Category
0

Buy Safely with Naukri.com
We support secure payment methods

Disclaimer

While Naukri Learning services have helped many customers over the years, we do not guarantee any interview calls or assure any job offers with any of our services.
The services associated with Naukri Learning are only provided through the website Naukri.com. You are advised to be cautious of calls/emails asking for payment from other web sites that claim to offer similar services under the name of Naukri.com. We have no associates/agents other than the partner sites that have been specifically named on the homepage of the website Naukri.com. We also recommend that you Security Guidelines and Terms and Conditions