To guide our students choosing a career track and improve their cybersecurity knowledge, “UIU Cisco Networking Academy” offers “Cybersecurity for Engineers” course for the freshers, who wants to get a kick-start in the cybersecurity domain. This course is completely free of cost and also OPEN TO ALL.
“Cybersecurity for Engineers” course covers foundation knowledge and essentials skills in all security domains in the cyber world – information security, systems security, network security, mobile security, physical security, ethics, and laws, related technologies, defense, and mitigation techniques used in protecting businesses.
Class Time
09:00 pm-11:00 pm
Class Platform
Cisco WebEx or Zoom Meet
Upon completion of the “Cybersecurity for Engineers” course, students will be able to perform the following tasks:
- – Describe the characteristics of criminals and professionals in the Cybersecurity realm.
- – Describe the principles of confidentiality, integrity, and availability as they relate to data states and Cybersecurity countermeasures.
- – Describe the tactics, techniques, and procedures used by cybercriminals.
- – Describe how technologies, products, and procedures are used to protect confidentiality.
- – Describe how technologies, products, and procedures are used to ensure integrity.
- – Describe how technologies, products, and procedures provide high availability.
- – Explain how Cybersecurity professionals use technologies, processes, and procedures to defend all components of the network.
- – Explain the purpose of laws related to Cybersecurity.
- – Basic Networking
- – Good Knowledge of Linux OS
- – LAB Set-ups and Introduction
- – Introduction to Cybersecurity
- – HTTP and HTTPS and Analysis with Wireshark
- – A World of Experts and Criminals
- – Wireshark and M-in-M Attack (ARP)
- – The Cybersecurity Cube
- – Data and Data Privacy
- – The Art of Protecting Secrets
- – Data and Data Privacy
- – The Art of Ensuring Integrity
- – Simple Password Crack (Brute Force Attack)
- – Cybersecurity Threats, Vulnerabilities, and Attacks
- – Detecting Threats and Vulnerabilities using NMAP
- – Gaining Access Using Metasploitable Framework
- – Exploit the FTP Backdoor and Samba