Tanvii Technologies.com

Introduction to Cyber Security Duration: 3 Month

  • What is Cyber Security?
  • Importance and Scope of Cyber Security
  • Types of Cyber Attacks
  • Key Cyber Threats (Phishing, Malware, Ransomware, DoS, Insider Threats)
  • CIA Triad (Confidentiality, Integrity, Availability)
  • Security Terminologies and Concepts

Networking Fundamentals

  • Basics of Networking (LAN, WAN, VPN)
  • OSI & TCP/IP Models
  • IP Addressing, Subnetting, and Ports
  • DNS, DHCP, HTTP/HTTPS, SMTP, FTP protocols
  • Firewalls, Routers, Switches basics
  • Packet Transmission & Wireshark Introduction

Operating Systems & System Security

  • Windows and Linux Basics
  • System Hardening Techniques
  • User Privileges & Access Control
  • File Permissions & Security Policies
  • Windows Registry & Event Viewer
  • Linux Security Commands & Logs

Cryptography Fundamentals

  • What is Cryptography?
  • Types: Symmetric vs Asymmetric Encryption
  • Hashing (MD5, SHA)
  • Digital Signatures & Certificates
  • Public Key Infrastructure (PKI)
  • SSL/TLS and HTTPS
  • Real-World Use Cases of Cryptography

Cyber Threats, Attacks & Vulnerabilities

  • Types of Attacks: Malware, Virus, Worms, Trojan, Ransomware
  • Social Engineering & Phishing
  • Man-in-the-Middle (MITM)
  • SQL Injection, XSS, CSRF
  • Denial of Service (DoS/DDoS)
  • Vulnerability Scanning & Exploits

Security Tools & Techniques

  • Introduction to Security Tools
  • Wireshark – Network Packet Analysis
  • Nmap – Network Scanning
  • Metasploit – Exploitation Framework
  • Burp Suite – Web Application Testing
  • Nessus/OpenVAS – Vulnerability Scanning

Web Application Security

  • Web Application Architecture
  • OWASP Top 10 Vulnerabilities
  • SQL Injection, XSS, CSRF in detail
  • Secure Coding Practices
  • Web Application Firewalls (WAFs)
  • Vulnerability Assessment & Penetration Testing (VAPT)

Ethical Hacking (Practical)

  • What is Ethical Hacking?
  • Hacking Phases (Reconnaissance, Scanning, Exploitation, Post-Exploitation)
  • Footprinting & Information Gathering
  • Network & System Hacking Techniques
  • Password Cracking & Privilege Escalation
  • Wireless Hacking Basics
  • Reporting & Documentation

Security Operations & Incident Management

  • What is a SOC (Security Operations Center)?
  • Log Analysis & Monitoring
  • SIEM Tools (Splunk, QRadar, ELK Stack)
  • Incident Response Process
  • Threat Hunting & Forensics Basics
  • Indicators of Compromise (IoCs)
  • Case Study: Handling a Cyber Incident

Cloud & Network Security

  • Introduction to Cloud Computing (AWS, Azure, GCP)
  • Cloud Security Principles
  • Identity & Access Management (IAM)
  • Network Security Concepts
  • Firewalls, IDS/IPS, VPNs
  • Secure Network Design & Segmentation
  •  

Endpoint & Data Security

  • Endpoint Protection Tools (Antivirus, EDR)
  • Data Loss Prevention (DLP)
  • Disk Encryption & Backup Security
  • Patch Management & Updates
  • Email Security & Spam Filters

Cyber Laws, Governance & Compliance

  • Overview of Cyber Laws (Global & Indian IT Act 2000)
  • GDPR, HIPAA, ISO 27001, PCI-DSS
  • Security Policies & Frameworks
  • Risk Assessment & Management

Emerging Trends in Cyber Security

  • Artificial Intelligence in Cyber Security
  • Zero Trust Architecture
  • Blockchain & Security
  • Quantum Cryptography (Intro)
  • Cyber Threat Intelligence

Projects & Hands-On Labs

Mini Projects:

  • Network Scanning using Nmap
  • Packet Analysis using Wireshark
  • SQL Injection Lab
  • Password Cracking using Hashcat

Capstone Projects:

  • Web App Penetration Testing Report
  • SOC Incident Response Simulation
  • Secure Network Design for a Company
  • Cloud Security Configuration Audit

Career Preparation & Certifications

  • Resume Building for Cyber Security Roles
  • Setting up a Cyber Security Lab (VirtualBox/Kali Linux)
  • Mock Interviews & Practical Scenarios
  • Certification Roadmap: CompTIA Security+
  • CEH (Certified Ethical Hacker)
  • CISSP (Intro)
  • AWS Security / Azure Security
  • OSCP (for advanced learners)

Request A Call Back

Ever find yourself staring at your computer screen a good consulting slogan to come to mind? Oftentimes.

    Our company operates as a diversified solutions provider with expertise across sectors:

    Information

    Our Gallery

    Copyright © 2025 Tanvii Technologies | All Right Reserved
    Support Terms & Conditions Privacy Policy.

    Newsletter SignUp!