Advanced Cybersecurity
Advanced cybersecurity involves employing cutting-edge technologies and methodologies to safeguard digital assets against sophisticated cyber threats, ensuring robust defense mechanisms and proactive threat detection.
Course Information
-
Module 1
Revision of Fundamental learnings (00:14:58)
Principles in Security Design (Defence in depth DevSecOps) (00:26:10)
Standards - ISMS and ISO 27001 - the fundamental building block of IS/CE Part6 (00:35:19)
Standards - ISMS and ISO 27001 - the fundamental building block of IS/CE Part1 (00:36:38)
Standards - ISMS and ISO 27001 - the fundamental building block of IS/CE Part2 (00:36:28)
Standards - ISMS and ISO 27001 - the fundamental building block of IS/CE Part3 (00:35:33)
Standards - ISMS and ISO 27001 - the fundamental building block of IS/CE Part4 (00:23:16)
Standards - ISMS and ISO 27001 - the fundamental building block of IS/CE Part5 (00:36:44)
KPI Design and reporting Part1 (00:23:38)
KPI Design and reporting Part2 (00:30:14)
KPI Design and reporting Part3 (00:26:50)
Standards - NIST, CIS etc (00:35:18)
TEST (00:00:00)
Assignment Module1 (00:00:00)
-
Module 2
Auditing Concepts including auditing ISMS, internal audit etc Part 1 (00:22:23)
Auditing Concepts including auditing ISMS, internal audit etc Part 2 (00:15:54)
Auditing Concepts including auditing ISMS, internal audit etc Part 3 (00:16:09)
Auditing Concepts including auditing ISMS, internal audit etc Part 4 (00:15:21)
Auditing Concepts including auditing ISMS, internal audit etc Part 5 (00:17:53)
Auditing Vendors and Third Parties Part1 (00:21:09)
Auditing Vendors and Third Parties Part2 (00:20:07)
Risk framework design, risk assessment and remediation (00:19:12)
TEST (00:00:00)
Assignment Module2 (00:00:00)
-
Module 3
Cryptography & Encryption - Technology Concept (00:03:07)
Cryptography & Encryption - full disk encryption, database encryption Concept (00:03:15)
Cryptography & Encryption - data in transit and data at rest Concept (00:03:25)
Identity _ Access Management (SSO, MFA) Concept (00:03:26)
Segregation of Duties Concept (00:03:40)
Data Classification (00:18:15)
IT Asset inventory management (00:16:44)
Identity & Access Management (SSO, MFA) (00:31:06)
Access Control Lists (00:43:33)
Segregation of Duties (00:19:17)
Cryptography & Encryption - technology (00:21:28)
Cryptography & Encryption - technologies and tools (00:17:42)
Cryptography & Encryption - full disk encryption, database encryption (00:19:25)
Cryptography & Encryption - data in transit and data at rest (00:18:15)
TEST (00:00:00)
Assignment Module3 (00:00:00)
-
Module 4
Cyber Physical Security (cctv, biometrics, facial etc) Concept (00:03:20)
Incidence Management, Response Concept (00:02:47)
Forensics, Incident investigation and RCA Concept (00:02:54)
Patch Management Concept (00:03:27)
Backup Management Concept (00:03:08)
Cyber-Physical Security (CCTV, Biometrics, Facial, etc) Part1 (00:18:59)
Cyber-Physical Security (CCTV, Biometrics, Facial, etc) Part2 (00:23:17)
Cyber-Physical Security (CCTV, Biometrics, Facial, etc) Part3 (00:29:05)
Incident Management, Response (00:17:20)
Incident Management, Response-2 (00:17:35)
Forensics, Incident Investigation and RCA (00:20:33)
Forensics, Incident Investigation and RCA-2 (00:14:31)
Patch Management (00:19:12)
Backup Management (00:28:06)
Backup management Part2 (00:27:29)
TEST (00:00:00)
Assignment Module4 (00:00:00)
-
Module 5
AV Malware, ransomware Concept (00:03:14)
Threat hunting, Threat Intelligence Concept (00:03:23)
Log Management Concept (00:03:18)
Drills and tests for IT operations Concept (00:03:01)
Antivirus, Malware, Ransomware (00:17:17)
Threat Hunting (00:29:55)
Threat Hunting Part2 (00:24:13)
Log Management (00:20:05)
Log Management Part2 (00:15:37)
Drills and Tests for IT Operations (00:15:04)
Drills and Tests for IT Operations Part2 (00:21:33)
Drills and Tests for IT Operations Part3 (00:16:15)
Drills and Tests for IT Operations part4 (00:22:47)
TEST (00:00:00)
Assignment Module5 (00:00:00)
-
Module 6
System Acquisition Dev and Maintenance (DevDecOps) Concept (00:03:15)
VA and PT Concept (00:03:25)
System Acquisition Dev and Maintenance (DevSecOps) Part1 (00:15:07)
System Acquisition Dev and Maintenance (DevSecOps) Part2 (00:10:29)
System Acquisition Dev and Maintenance (DevSecOps) Part3 (00:13:28)
System Acquisition Dev and Maintenance (DevSecOps) Part4 (00:13:07)
System Acquisition Dev and Maintenance (DevSecOps) Part5 (00:14:55)
System Acquisition Dev and Maintenance (DevSecOps) Part6 (00:19:13)
Vulnerability Assessment & Penetration Testing (VA & PT) (00:32:09)
Vulnerability Assessment & Penetration Testing Part2 (00:32:55)
Vulnerability Assessment & Penetration Testing Part3 (00:34:24)
Vulnerability Assessment & Penetration Testing (VA & PT) Part3 (00:33:32)
TEST (00:00:00)
Assignment Module6 (00:00:00)
-
Module 7
Application Security Testing Concept (00:03:28)
IP addressing, DNS, IPv4, IPv6 and Protocols Concept (00:03:18)
Network architecture design Concept (00:03:09)
Database security Concept (00:03:20)
Servers - configuration, access, hardening (windows and linux) Concept (00:03:06)
Application Security Testing Part1 (00:38:21)
Application Security Testing Part 2 (00:52:52)
Application Security Testing Part 3 (00:29:29)
IP addressing, DNS, IPv4, IPv6, and Protocols (00:20:20)
Network Architecture Design (00:16:49)
Network Security Principles (00:15:58)
Database Security Part1 (00:35:05)
Database Security Part2 (00:22:34)
Servers - Configuration, access, hardening (Windows and Linux) Part1 (00:20:04)
Servers - Configuration, access, hardening (Windows and Linux) Part2 (00:20:01)
Servers - Configuration, access, hardening (Windows and Linux) Part3 (00:19:48)
Network Security principles Concept (00:02:44)
TEST (00:00:00)
Assignment Module7 (00:00:00)
-
Module 8
Threat Modeling Concept (00:03:08)
Vendor Risk Management - principles and practices Concept (00:02:59)
Vendor Risk Management - Vendor Auditing Concept (00:03:14)
SOC Setup and Operations Concept (00:03:24)
SIEM - Information Security Incident Management Concept (00:02:41)
Disaster Recovery and Crisis Mgt Concept (00:03:08)
Threat Modeling (00:17:04)
Vendor Risk Management - Principles and Practices (00:18:34)
Vendor Risk Management - Regulatory Requirements (00:13:24)
SOC Setup and Operations Part1 (00:16:29)
SOC Setup and Operations Part2 (00:10:18)
SOC Setup and Operations - SOC Ops and IR (00:17:45)
SOC Setup and Operations Part2 (00:22:03)
Security Operations Center(SOC) Setup and operations Part3 (00:22:20)
SIEM - Information Security Incident Management (00:28:35)
Disaster Recovery and Crisis Management (00:19:52)
Disaster Recovery and Crisis Management Part2 (00:16:56)
Disaster Recovery and Crisis Management Part3 (00:15:47)
Vendor Risk Management - Vendor Auditing (00:18:29)
TEST (00:00:00)
Assignment Module8 (00:00:00)
-
Final Certification Examination
Final Cerfication Examination (00:00:00)
Course Content
Authors
Dinesh Bareja
15 DAYS ACCESS
₹0
Start learning today! Switch to full course access, when satisfied with the trial.
PROJECT
Data Modeling with Postgres
In this project, you’ll model user activity data for a music streaming app called Sparkify. You’ll create a relational database and ETL pipeline designed to optimize queries for understanding what songs users are listening to. In PostgreSQL you will also define Fact and Dimension tables and insert data into your new tables.