Diploma in Cyber Security and Networking (Saturday)


Diploma in Cyber Security and Networking (Saturday)
@ Turnkey IT Training

Course Content 
1. Introduction to Networking  
   - Overview of networks and their significance in IT environments.  
   - Essential components: devices, topologies, and architectures.  

2. Networking Concepts and Protocols  
   - Examination of key networking protocols and their applications.  
   - Concepts like packet switching and network communication.  

3. The OSI Model  
   - Understanding the seven layers and their roles in networking.  
   - Troubleshooting using the OSI framework.  

4. Introduction to IP Addressing
   - Fundamentals of IPv4 and IPv6.  
   - Hierarchical addressing and its application in networks.  

5. Introduction to Binary and Hexadecimal  
   - Overview of numeral systems used in computing.  
   - Practical application in addressing and protocol configurations.  

6. Subnetting Networks  
   - Creating efficient subnetworks.  
   - Calculating subnet masks and determining host availability.  

7. Protocols and Port Numbers  
   - Commonly used protocols and their designated ports.  
   - Role of ports in enabling specific types of communication.  

8. TCP and UDP  
   - Differences and use cases for Transmission Control Protocol and User Datagram Protocol.  
   - Analysis of reliability versus speed in communication.  

Cybersecurity Fundamentals 
9. Cybersecurity Threats, Vulnerabilities, and Attacks 
   - Identifying various types of cyber threats.  
   - Understanding vulnerabilities and attack vectors.  

10. Securing Networks  
    - Network protection techniques: firewalls, VPNs, IDS/IPS.  
    - Security best practices for safe environments.  

11. Attacking the Foundation  
    - Analysis of infrastructure vulnerabilities.  
    - Ethical hacking methods to test and improve defenses.  

12. Attacking What We Do  
    - Social engineering tactics and defense mechanisms.  
    - Protecting against phishing, baiting, and other attack strategies.  

13. Wireless Network Communication Devices  
    - Wireless communication standards and devices.  
    - Securing wireless networks and preventing unauthorized access.  

14. Network Security Infrastructure  
    - Designing secure infrastructures using advanced tools and technologies.  
    - Layered security strategies for robust defenses.  

Operating Systems and Endpoint Security  
15. The Windows Operating System 
    - Features and security tools of Windows OS.  
    - Managing user privileges, firewalls, and updates.  

16. Linux Overview  
    - Fundamentals of Linux systems.  
    - Command-line tools for security and administration.  

17. System and Endpoint Protection  
    - Securing devices and endpoints against cyber threats.  
    - Tools for endpoint detection and response (EDR).  

18. Cybersecurity Principles, Practices, and Processes
    - Understanding confidentiality, integrity, and availability (CIA triad).  
    - Developing policies and processes to ensure organizational security.  

 

Assessment

Students need to go through a Practical Exam at the end of the course to qualify for the certificate.

Pre-request

Students are expected to have a good understanding of Windows, Linux and Networking concepts.

Note

This course will prepare the students to take up the EC-Council CEH [Certified Ethical Hacker] Certification Course & Certifications.

Delivery - 80% Practical & 20% Theory

Mode of Delivery - Classroom Instructor-Led

More Elaborate explanation

Certification 1

CEH [Certified Ethical Hacker] certification is one of the pioneers and valuable options in the information security industry. Turnkey offers a well-structured course in Cyber Security with Ethical Hacking for students and industry experts to cater to the requirements of the CEH certification. Students will be given the necessary tools and resources (i labs) to practice various exercises related to ethical hacking and information security. The students will be trained with a hands-on lab environment where they will be shown how to perform security penetration and hacking ethically. They will be educated with various different ways of achieving information security infrastructure in their organization.

Certification 2

CHFI [Computer Hacking Forensic Investigator] certification is a vital asset for every information security practitioners. Cyber Security with Ethical Forensics offered by Turnkey provides complete coverage of CHFI certification course contents. Students will be given the necessary tools and software to practice the given exercises. With the one to one attention and structured course materials students are trained to understand and work on the ethical forensic concepts.

For more information contact us.

Commencement

January 11, 2025

Duration

3 months

Course Fee

LKR 56,000

Course Level

Advanced Diploma , Training

Location

Colombo

Category

Hacking Certifications

Contact Details

+94 11 2 581581, +94 77 2286988

http://turnkey.lk

562/16 , Lower Bagathalle Road , Colombo 03

Send Inquiry

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scholarship Alerts

Type "REG coursenet" and SEND to 77000

Get latest scholarships, offers & academic event alerts to your phone via SMS.

Service is available for Dialog, Mobitel, Hutch & Airtel users. Monthly (Rs. 30 + tax).

Related Courses

Institute Courses

Loading...