Cyber Security Professionals
About Course
Course by:
IT Business Incubator, CUET
Chattogram-4349, Bangladesh.
Course Summary
No. | Subject | Comments |
1 | Course Duration | 48 Hours (16 Classes, 8 Weeks) |
2 | Pre-requisites | Basic understanding of computers and networking concepts. |
3 | Lab Facilities | SKITBI, CUET will provide. |
Schedule
Batch – 01 (Offline): Friday & Saturday 10 am to 1 pm
Batch – 02 (Online): Friday & Saturday 6 pm to 9 pm
Coordinator
Professor Dr. M. Moshiul Hoque
Professor, Dept of CSE, CUET
Director, IT Business Incubator in CUET
Former Dean, Faculty of Electrical & Computer Engineering, CUET
Chair, IEEE Bangladesh Section
Trainers
An expert panel comprising industry and academic professionals will lead the course.
Learning Outcomes
By the end of this course, participants will:
- Understand cyber threats, risks, and basic cybersecurity concepts.
- Acquire essential networking skills for secure network management.
- Master operating system security practices and cryptography fundamentals.
- Learn web security principles and how to secure web applications.
- Develop expertise in incident response, penetration testing, and advanced cybersecurity concepts.
Course Modules
Module | Topics Covered | Duration | Comments |
Module 1: Introduction to Cyber Security | Overview of cyber threats and risks, Importance of cybersecurity in the digital age, Basic terminology and concepts. | 3 hours | Provides a foundational understanding of the cybersecurity landscape. |
Module 2: Fundamentals of Networking | Basics of networking and protocols, TCP/IP fundamentals, Understanding network architectures. | 6 hours | Establishes core networking knowledge essential for cybersecurity. |
Module 3: Operating System Security | Securing Windows, Linux, or macOS, User account management and permissions, Patch management. | 3 hours | Focuses on securing operating systems, a crucial aspect of cybersecurity. |
Module 4: Introduction to Cryptography | Basic cryptographic concepts, Encryption and decryption techniques, Public key infrastructure (PKI). | 3 hours | Introduces principles of cryptography and its role in cybersecurity. |
Module 5: Web Security Basics | Common web vulnerabilities (SQL injection, XSS), Securing web applications, Web application firewalls (WAF). | 3 hours | Addresses security concerns specific to web applications. |
Module 6: Threat Intelligence and Information Sharing | Understanding threat intelligence, Information sharing and collaboration, Threat feeds and analysis. | 3 hours | Introduces importance of threat intelligence in cybersecurity. |
Module 7: Network Security | Firewalls and intrusion detection/prevention systems, Virtual Private Networks (VPNs), Securing wireless networks. | 3 hours | Explores network-centric security measures. |
Module 8: Incident Response and Handling | Developing an incident response plan, Identifying and responding to security incidents, Post-incident analysis. | 3 hours | Equips professionals with skills to respond effectively to security incidents. |
Module 9: Security Assessment and Penetration Testing | Conducting vulnerability assessments, Penetration testing methodologies, Reporting and remediation. | 6 hours | Covers techniques for identifying and mitigating vulnerabilities. |
Module 10: Advanced Cyber Security Concepts | Advanced persistent threats (APTs), Zero-day vulnerabilities, Advanced malware analysis. | 6 hours | Explores advanced topics to deepen cybersecurity knowledge. |
Module 11: Cloud Security | Fundamentals of cloud computing security, Securing cloud infrastructure and services, Identity and access management (IAM) in the cloud. | 6 hours | Addresses security challenges and best practices in cloud environments. |
Module 12: Mobile Security | Mobile device security fundamentals, Securing mobile applications, Mobile device management (MDM) and BYOD policies. | 3 hours | Covers security considerations for mobile platforms and applications. |
Frequently Asked Questions (FAQ)
Can I register for multiple courses?
Yes, you can register for up to two courses of your choice.
Is there an overlap in class schedules for multiple courses?
The course schedule is published in the notice section of the website.
What are the available payment methods for online enrollment?
You can pay in cash or online using the “Bkash to Bank” option.
Are evening batches available for job holders?
Yes, evening batches are available. Please visit the website’s notice board to see the routine.
Can I switch between online and offline classes?
You cannot switch between online and offline. You have to continue in one shift at a time.
How will admission be confirmed?
If you receive a confirmation email, your admission is confirmed.
Will classes be conducted in locations other than the chosen one?
No, classes will be conducted only at the chosen location.
What is the profile of the trainers?
The trainers are from the chosen faculty, along with industrial experts.
What is the deadline for enrollment?
The enrollment process will remain open until all seats are filled. There is no specific deadline, but once the capacity is reached, enrollment will close automatically.
Can I enroll physically?
To enroll physically, please visit the Multipurpose Building IT Business Incubator CUET on the third floor (rooms 301 and 302).
Will a recording of the sessions be available?
Yes, after each class, you will receive a recording, and you will have lifetime access to it
Course Content
All Modules
-
Module 3: Operating System Security
03:24:13 -
Module 4: Introduction to Cryptography
00:00 -
Module 5: Web Security Basics
00:00 -
Module 6: Threat Intelligence and Information Sharing
00:00 -
Module 7: Network Security
00:00 -
Module 8: Incident Response and Handling
00:00 -
Module 9: Security Assessment and Penetration Testing
00:00 -
Module 10: Advanced Cyber Security Concepts
00:00 -
Module 11: Cloud Security
00:00 -
Module 12: Mobile Security
00:00