5.00
(1 Rating)

Cyber Security Professionals

By ITBI, CUET Categories: Phase 01, Security
Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Course by:

IT Business Incubator, CUET 

Chattogram-4349, Bangladesh.

Download Course Module

 

 

Course Summary 

No. Subject Comments
1 Course Duration 48 Hours (16 Classes, 8 Weeks)
2 Pre-requisites  Basic understanding of computers and networking concepts.
3 Lab Facilities SKITBI, CUET will provide.

 

 

Schedule

Batch – 01 (Offline): Friday & Saturday 10 am to 1 pm

Batch – 02 (Online): Friday & Saturday 6 pm to 9 pm

 

Coordinator 

Professor Dr. M. Moshiul Hoque

Professor, Dept of CSE, CUET

Director, IT Business Incubator in CUET

Former Dean, Faculty of Electrical & Computer Engineering, CUET

Chair, IEEE Bangladesh Section

 

Trainers

An expert panel comprising industry and academic professionals will lead the course.

 

Learning Outcomes

By the end of this course, participants will:

  • Understand cyber threats, risks, and basic cybersecurity concepts.
  • Acquire essential networking skills for secure network management.
  • Master operating system security practices and cryptography fundamentals.
  • Learn web security principles and how to secure web applications.
  • Develop expertise in incident response, penetration testing, and advanced cybersecurity concepts.

 

Course Modules

Module Topics Covered Duration Comments
Module 1: Introduction to Cyber Security Overview of cyber threats and risks, Importance of cybersecurity in the digital age, Basic terminology and concepts. 3 hours Provides a foundational understanding of the cybersecurity landscape.
Module 2: Fundamentals of Networking Basics of networking and protocols, TCP/IP fundamentals, Understanding network architectures. 6 hours Establishes core networking knowledge essential for cybersecurity.
Module 3: Operating System Security Securing Windows, Linux, or macOS, User account management and permissions, Patch management. 3 hours Focuses on securing operating systems, a crucial aspect of cybersecurity.
Module 4: Introduction to Cryptography Basic cryptographic concepts, Encryption and decryption techniques, Public key infrastructure (PKI). 3 hours Introduces principles of cryptography and its role in cybersecurity.
Module 5: Web Security Basics Common web vulnerabilities (SQL injection, XSS), Securing web applications, Web application firewalls (WAF). 3 hours Addresses security concerns specific to web applications.
Module 6: Threat Intelligence and Information Sharing Understanding threat intelligence, Information sharing and collaboration, Threat feeds and analysis. 3 hours Introduces importance of threat intelligence in cybersecurity.
Module 7: Network Security Firewalls and intrusion detection/prevention systems, Virtual Private Networks (VPNs), Securing wireless networks. 3 hours Explores network-centric security measures.
Module 8: Incident Response and Handling Developing an incident response plan, Identifying and responding to security incidents, Post-incident analysis. 3 hours Equips professionals with skills to respond effectively to security incidents.
Module 9: Security Assessment and Penetration Testing Conducting vulnerability assessments, Penetration testing methodologies, Reporting and remediation. 6 hours Covers techniques for identifying and mitigating vulnerabilities.
Module 10: Advanced Cyber Security Concepts Advanced persistent threats (APTs), Zero-day vulnerabilities, Advanced malware analysis. 6 hours Explores advanced topics to deepen cybersecurity knowledge.
Module 11: Cloud Security Fundamentals of cloud computing security, Securing cloud infrastructure and services, Identity and access management (IAM) in the cloud. 6 hours Addresses security challenges and best practices in cloud environments.
Module 12: Mobile Security Mobile device security fundamentals, Securing mobile applications, Mobile device management (MDM) and BYOD policies. 3 hours Covers security considerations for mobile platforms and applications.

 

Frequently Asked Questions (FAQ)

 

Can I register for multiple courses?

Yes, you can register for up to two courses of your choice.

 

Is there an overlap in class schedules for multiple courses?

The course schedule is published in the notice section of the website.

 

What are the available payment methods for online enrollment?

You can pay in cash or online using the “Bkash to Bank” option. 

 

Are evening batches available for job holders?

Yes, evening batches are available. Please visit the website’s notice board to see the routine. 

 

Can I switch between online and offline classes?

You cannot switch between online and offline. You have to continue in one shift at a time.

 

How will admission be confirmed?

If you receive a confirmation email, your admission is confirmed.

 

Will classes be conducted in locations other than the chosen one?

No, classes will be conducted only at the chosen location.

 

What is the profile of the trainers?

The trainers are from the chosen faculty, along with industrial experts.

 

What is the deadline for enrollment?

The enrollment process will remain open until all seats are filled. There is no specific deadline, but once the capacity is reached, enrollment will close automatically.

 

Can I enroll physically?

To enroll physically, please visit the Multipurpose Building IT Business Incubator CUET on the third floor (rooms 301 and 302).

 

Will a recording of the sessions be available?

Yes, after each class, you will receive a recording, and you will have lifetime access to it

Show More

Course Content

All Modules

  • Module 3: Operating System Security
    03:24:13
  • Module 4: Introduction to Cryptography
    00:00
  • Module 5: Web Security Basics
    00:00
  • Module 6: Threat Intelligence and Information Sharing
    00:00
  • Module 7: Network Security
    00:00
  • Module 8: Incident Response and Handling
    00:00
  • Module 9: Security Assessment and Penetration Testing
    00:00
  • Module 10: Advanced Cyber Security Concepts
    00:00
  • Module 11: Cloud Security
    00:00
  • Module 12: Mobile Security
    00:00

Introduction to Cyber Security

Fundamentals of Networking

Operating System Security

Professor Dr. Shamsul Arefin / Class 01

Professor Dr. Shamsul Arefin / Class 02

Amit Chakraborty Sir (Class 1)

Amit Chakraborty Sir (Class 2)

Amit Chakraborty Sir (Class 3)

1. Defensive Side of Cyber Security & SOC Fundamentals

SIEM Solution Overview & Introducing Splunk SIEM Solution and Lab Installation

Security Assessment and Penetration Testing

Advanced Cyber Security Concepts

Cloud Security

Mobile Security

Class 14 || Oct. 04

Class 15 || Oct. 5

Class 16 || Oct. 26

Class 17 || November 02

Class 18|November 08, 2024

Class 19|November 10, 2024

Class 20| November 15, 2024

Class 20| November 16, 2024

Class 21| November 22, 2024

Class 22 | November 23 2024

Class 23 | November 30,2024

Class 24 | December 02,2024 |Backup Class 01

Class 25 | December 05 ,2024| Backup Class 02

Class 26 | December 06 2024

Class 27 | 07 December 2024

Class 28 |09 December 2024

Class 29 | 20 December 2024

Student Ratings & Reviews

5.0
Total 1 Rating
5
1 Rating
4
0 Rating
3
0 Rating
2
0 Rating
1
0 Rating
RA
4 weeks ago
Excellent!
Your Cart0
There are no products in the cart!
Continue Enrollment
Scroll to Top
×