About This Course
MBA in Cyber Security
The MBA in Cyber Security program offers a rising pitch of skills for its learners and professionals. Learn about the fundamentals and progress to more advanced chops for a better, streamlined, enhanced, and superiorly finer knowledge structure experience like no other. In our MBA in Cyber Security Program, you'll learn with Cyber Security experts and instructors who have a wealth of knowledge, precious experience, and practical approach.
5 in 1 Course
- Training
- Projects
- Placement Support
- Certification
- Assignments
Industry Projects
Get hands-on experience in capstone industry projects with an MBA in Cyber Security
Takeaways of Your Investment
- 288 hours of intensive training
- Industry-acclaimed Cyber Security Course Certification
- Free 1-year subscription to Kodakco LMS
- Monthly Masterclass sessions
- The updated industry-oriented study material
- Recorded videos of the sessions
- 100% placement assistance, internship opportunities, and project support exclusively entitled to the professionals
- Add-on supplements provided to effectively deliver projects (Logo Software, E-Books, Question Making Software, Project Guides/Workbooks, Mobile App, etc)
- Get certification from any of our partners - Dunster Business School, Switzerland or College de Paris
Module 1: Fundamentals of Cyber Security
Learn concepts, frameworks, and best practices essential for building a strong cybersecurity knowledge base.
- Introduction to CyberSecurity
- Cybersecurity Frameworks & Standards
- Introduction to Virtualisation
Module 2: Introduction to Linux
Learn about Linux basics, command-line navigation, user & group management & security features.
- Linux Basics
- User & Group Management
- Linux Privilege Management
Module 3: Fundamentals of Networking Methodologies
Learn about networking, including the OSI Model, TCP/IP Protocols, & network topologies.
- Introduction to Networking
- IP Addressing & Subnetting
- Network Topologies & Design
Module 4: Scanning Networks
Learn the techniques & tools for scanning networks, identifying active hosts, & discovering open ports.
- Network Scanning Basics
- Host Discovery & Port Scanning
Module 5: Reconnaissance & Information Gathering
Learn about developing skills in footprinting, OSINT, & network mapping to gather information for security assessment.
- Footprinting & Reconnaissance
- OSINT [Open Source Intelligence]
Module 6: Vulnerability Assessment
Learn about vulnerability assessment, use scanning tools, & analyze results to enhance system security.
- Introduction to Vulnerability Analysis
- Vulnerability Scanning Tools
- Vulnerability Analysis & Reporting
Module 7: Malware Threats
Learn about recognizing, analyzing, and mitigating various types of malware threats, including viruses, worms, and Trojans.
- Understanding Malware
- Malware Detection & Analysis
- Malware Prevention & Mitigation
Module 8: System Security Testing
Learn about password cracking, privilege escalation, and rootkits to secure systems against unauthorized access.
- Password Cracking & Attacks
- Privilege Escalation
- Rootkits & Backdoors
Module 9: Cryptography
Learn about encryption, digital signatures, and cryptographic attacks to ensure secure communication.
- Basic Cryptography Concepts
- Public Key Infrastructure [PKI]
- Cryptography Attacks
Module 10: Network Sniffing
Learn about packet sniffing basics, protocol analysis, and countermeasures to secure networks against unauthorized access.
- Packet Sniffing Basics
- Protocol Analysis
- Sniffing Countermeasures
Module 11: Social Engineering
Learn about psychology and techniques of social engineering attacks, emphasizing prevention and awareness.
- Understanding Social Engineering
- Social Engineering Techniques
- Social Engineering Prevention
Module 12: Web Server Security Testing
Learn about testing and securing web servers, covering OWASP's top ten vulnerabilities and secure coding practices.
- Automated Web Server Scanning
- Web Application Firewalls [WAF]
Module 13: Web App Security Testing
Learn about automated and manual testing of web applications, focusing on identifying and mitigating security vulnerabilities.
- Web App Security Fundamentals
- Web App Reconnaissance
- Automated Web App Scanning
- OWASP Top 10 Testing
Module 14: Wireless Network Security Testing
Learn about networking fundamentals, encryption cracking, and securing against wireless attacks.
- Wireless Networking Basics
- Wireless Encryption Cracking
Module 15: IoT Security Testing
Learn about the security challenges of Internet of Things (IoT) devices, protocols, and best practices for securing IoT environments.
- Introduction to IoT Security
- IoT Protocol Analysis
- Securing IoT Devices
Module 16: Cloud Computing Fundamentals
Learn about cloud service models, security best practices, and mitigating threats in cloud environments.
- Cloud Service Models
- Cloud Security Best Practices
- Cloud Specific Threats & Mitigations
Module 17: Mobile Platform Security Testing
Learn about assessing and enhancing the security of mobile platforms, including dynamic and static analysis of mobile apps.
- Mobile Security Fundamentals
- Mobile App Security Testing
Module 18: Firewall, IDS, IPS, Honeypots
Learn the technologies and strategies behind firewalls, intrusion detection/prevention systems, and honeypots for network defense.
- Firewall Technologies
- IDS & IPS
- Honeypots & Deception Techniques
Elective 1: Dark Web
Module 1: Introduction to the Dark Web
- Understanding the Dark Web
- Differentiating between the Dark Web, Deep Web, and Surface Web
- Overview of Dar Web Protocols
Module 2: Dark Web Infrastructure
- Tor Browser for Safe Dark Web Browsing
- I2P and other Alternative Dark Web Networks
- Identifying and Accessing Dark Web Gateways and Hidden Services
Module 3: Dark Web Anonymity and Security
- Exploring the Anonymity Provided by the Tor Network
- Tor Circuits, Relays, and Exit Nodes
- Personal Security on the Dark Web: Best Practices and Tools
- Utilizing Cryptographic Tools (e.g., PGP, OTR)
- Exploring Anonymizing Networks Beyond Tor
Module 4: Deep Web Intelligence Gathering
- OSINT Techniques Specific to the Dark Web
- Extracting Valuable Intelligence
- Dark Web Content Analysis: Identifying Trends, Threats, and Actor
- Dark Web Reconnaissance
Module 5: Dark Web Enumeration
- Exploring the Dark Web for Finding Organization Information
- Finding Breach Data on Wikileaks
- Finding Employee Information on Dark Web
- Detect Ransomware Dump Site Listings
- Finding the Behavior of APTs and Their TTP
- Detecting Exposed Credentials
Elective 2: IoT Attacks
Module 1: IoT Networking and Communication
- Basics of Networking Concepts
- The OSI Model
- TCP Model
- IEEE IoT Standards List
Module 2: IoT Processors and Operating System
- Hardware Devices
- Processors
- Operating Systems used in IoT
Module 3: Cloud and IoT
- Cloud Computing
- Types of Cloud Services
Module 4: IoT Threats
- Mirai
- BrikerBot
- Sybii
- Blackhole Attacks
Module 5: Threat Intelligence
- Vulnerability Database
- Shodan
- STRIDE
- DREAD
- CVSS
Elective 3: Penetration Testing
Module 1: Introduction to Penetration Testing and Methodologies
- Fundamentals of Penetration Testing
- Penetration Testing Approaches
- Strategies
- Penetration Methodologies and Techniques
- Recommendations for penetration testing
Module 2: Penetration Testing Scoping and Engagement
- Different Stages and Elements of Scoping
- Different stages and elements of Engagement
Module 3: Open-Source Intelligence (OSINT)
- Tools for intelligence gathering
- Website Analysis
- Frameworks and scripts for website analysis
Module 4: Network Penetration Testing - External
- Implement comprehensive penetration testing Methodologies
- Vulnerabilities from the outside of the network perimeter
Module 5: Network Penetration Testing - Internal
- Methodology for Assessing Networks from insider's perspectives
Module 6: IoT Penetration Testing
- Threats to the Internet of Things (IoT) networks
- Audit Security Controls
Elective 4: Ransomware Attacks
Module 1: Introduction
- Introduction to Ransomware
Module 2: Ransomware Attacks
- Ransomware as a Service
- Multiple Extortion
- Initial Access to Brokers
Module 3: Distinctive Ransomware TTP
- Data Encrypted for Impact
- Symmetric (Secret Key) Encryption
- Asymmetric (Public Key) Encryption
- Hybrid Encryption Approach
- Inhibit System Recovery - Introduction
- Deleting Volume Shadow Copies
- Resizing Volume Shadow Copy Storage Space
- Disabling Automatic Windows Recovery Features
- Removing Backup Catalog and Backup Data
- System Information Discovery
Module 4: Ransomware Attack Chain
- Reconnaissance
- Resource Development
- Initial Access
- Execution
- Persistence
- Privilege Escalation
- Defense Evasion
- Credential Access
- Discovery
- Lateral Movement
- Collection
- Command and Control
- Exfiltration
- Impact
- Illuminating DarkSide
Module 5: Prepare for Ransomware Attacks
- Reducing the Attack Surface
- Maintain and Verify Backups
- Utilize Security Controls
- Test Your Security Controls Against Ransomware
- Validate and Improve Security Controls