Certificate

Certificate in Cyber Security Foundation

Course Overview

Information Technology foundations examine IT as a discipline and its various roles and functions. The course covers IT disciplines including systems and services, hardware, networking, storage and backups and the business of IT. The course explores the different components of IT and how they work together as a system to support the different aspects of an organization. The course helps the students to get job roles as IT support, Network support, L1 Support engineer and many more.

Learning Outcomes

  • Installation, troubleshooting, and maintenance of server systems including the hardware.
  • Setting up hardware and software products, troubleshooting and resolving problems as they arise.
  • Managing and configuring Local Area Networks (LANs) and Wide Area Networks (WANs).
  • Analysis, configuration, and installation of network.
  • Monitoring of network performance and problem troubleshooting and problem solving.
  • Network security maintenance. Configuration of routers, switches, and firewall.
  • Installation, configuration and troubleshooting of Windows/Linux Operating Systems.
  • Analyze system requirements for a variety of computer applications.
  • Understanding systems concepts like virtualization.
  • Providing basic troubleshooting and guidance to customers in resolving their issues.
  • Knowledge of data backup, recovery and system security.
  • Manage file servers and print servers.
  • Ability to create accurate network diagrams and documentation for designing and planning network communication systems.
  • Handling Outlook and mailbox-related issues
 

Job Roles

  • IT Support Executive/Engineer
  • Technical Support Executive/Engineer
  • L1 Support Engineer
  • System Engineer/Administrator
  • Windows/Linux Administrator
  • Network System Administrator/Engineer
  • Field Service Engineer
  • Server Technician
  • Network Support Technician
  • Plan and create penetration methods, scripts, and tests.
  • Carry out remote testing of a client’s network or onsite testing of their infrastructure to expose weaknesses in security.
  • Conduct Vulnerability Assessment of Network and Security Devices
  • Conduct configuration reviews for OS, DB, Firewall, routers, Switches, and other security devices/components.
  • Perform manual testing of web applications.
  • Research and maintain proficiency in computer network exploitation, tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding, network security, and encryption.
  • Analyze scan reports and suggest remediation / mitigation plan.
Course Curriculum

  • Computer Fundamentals
  • Memory and Memory Management
  • Motherboard
  • Power Supply
  • Windows commands
  • Networking Basics
  • OSI Model
  • Network Devices
  • TCP/IP Protocols
  • Addressing methods and Subnetting
  • Network Firewalls
  • Important Network terms

  • What is OS?
  • OS Installation
  • Network Management
  • Storage and Performance
  • OS Configuration
  • User Management
  • Application Installation
  • AD Introduction
  • Implementation & Configuration of AD & DNS
  • Client Server Configuration
  • User Management
  • Configuration of Group Policy
  • DHCP Server Installation and Configuration
  • Install and Configure Mail Client

  • Types of Backups
  • Types of Storage
  • Storage Technologies
  • RAID Technology
  • Load Balancer
  • Clustering HA
  • Archiving

  • Types of cloud
  • Cloud Providers
  • Cloud Models
  • Cloud Security
  • How Cloud Operates?
  • Services Offered in Cloud

FAQ

Candidates have to submit the duly filled Candidate Interview form along with Registration Fee of INR 10,000/- to ED-SKILLS for attending the interview with the company. If the candidate is not selected in the interview, then the registration fee will be fully refunded to candidate.

Job roles after completing Professional Certification in Cybersecurity are in the Offensive Security areas as below:

  • Cyber Security Trainee/Analyst/Engineer
  • Information Security Analyst/Engineer/Consultant
  • Ethical Hacker
  • Penetration Tester
  • Vulnerability Assessment & Penetration Testing (VAPT) Analyst
  • Vulnerability Assessor
  • Red Team Consultant
  • Security Tester
  • Security Engineer/Architect

The conditional offer letter will have below:

  1. Designation will be Cybersecurity Trainee with Salary range of 4.0 to 5.0 Lacs per year.r
  2. Students should successfully complete the 6 months training program.
  3. Students should have minimum 80% attendance during the training.
  4. Students should score minimum 80% grades in all the examinations during the training.
  5. Students should be ready for any job location in India.
  6. Students should give a commitment to work in the company for a period of 12 months from date of joining.

Candidates have to successfully complete the 6 months Professional Certification in Cybersecurity course which has modules/topics as below:

  • Foundation Module
    1. Hardware & Networking
    2. Operating Systems
    3. Availability (Storage & Backups)
    4. Cloud Fundamentals
  •  

  • Cyber Security Module
    1. Certified Cyber Crime Intervention Officer
    2. Certificate in Professional Ethics at Workplace
    3. Certificate in Basics of Information Security
    4. Certificate in Penetration Testing

Delivery Mode:
ONLINE – Instructor Led Live Sessions through ZOOM/GMEET with Access to CYBER RANGE VIRTUAL LABS The sessions are conducted on Weekends (3 hrs on Sat and Sun) OR Weekdays (2 hours / 3 days)

Eligibility:

  1. Graduates from any stream (IT & Non-IT)
  2. Students studying in final year of graduation (any stream)
Get Started Now

Send us a Message