• Have Any Queries +919677781155
  • Call : 1800 889 0145
  • info@elysiumacademy.org
Logo (2)
  • About Us
    • Academy Overview
    • Mission & Vission
    • Foot Steps
    • Our Pillars
    • Gallery
    • Testimonials
      • Video Testimonials
      • Reviews
    • Our Awards
  • Tesbo Courses
      Tesbo Courses PREMIUM
      • Full Stack JS Programmer Course
      • Full Stack Core Programmer
      • Full Stack Native Programmer
      • Data Analyst CourseOFFER
      • Testing Expert CourseOFFER
      • Mobile App Developer Course
      • IT Infra Manager
      • Cloud Architect Course
      • DevOps Engineer Course
      • Digital Marketing CourseOFFER
      Slash CoursesBUDGET
      • Core C & C++ Coures
      • Core Java & Concepts Course
      • Core Python & Concepts Course OFFER
      • Core UI Development Course
      • Microsoft Office Course
      • CompTIA – Hardware A+ Course
      Classic Courses BUDGET
      • Core C & C++ Coures
      • Core Java & Concepts Course
      • Core Python & Concepts Course OFFER
      • Core MSSQL Course
      • Digital Marketing Courses
      mega-menu
  • Professional Course
      Professional Courses
      Programming Training
      • Programming Course TOP
      • Advanced Java Course
      • Advanced Python Course
      Full Stack Training
      • MERN Stack Course
      • MEAN Stack Course
      Mobile App Training
      • Android Course
      • IOS CourseOFFER
      • Flutter & Dart Course
      • React Native CourseOFFER
      Cyber Security Training
      • Hacking Defender Course
      • Security+ Course
      • Security Analyst+ Course
      • Elynux Essentials Course
      Networking Tranining
      • CCNA - Cisco Solutions
      • CCNP - Switching , Routing
      • Hardware A+ & Network N+
      DB Management Training
      • MySQL & MSSQL Course
      • Oracle DB Management
      Software Testing
      • ISTQB Course TOP
      • Automation Testing TOP
      Data Science & Analyst
      • Python for Data Science-ML
      • DA- (R,Tableau & Power BI)
      Cloud Computing Training
      • Cloud Practioner Course
      • Cloud Solution Architect Course
      • DevOps Professional Course
      • Cloud DevOps Engineer Course
      Crash Courses
      Programming Training
      • C++ Programming Course
      • Java Course OFFER
      • Python Course
      • UI Development Course
      • AngularJs Course
      • NodeJs Course
      • ReactJs Course
      • Wordpress Course
      • .Net Course TOP
      • Go Programming Course
      • Perl Programming Course
      • C# Programming CourseOFFER
      Business Management Course
      • Microsoft Office Course
      • Excel for Enterprises Course
      Testing Training
      • Selenium Java Course
      • Selenium Python Course
      Security Training
      • Hardware A+ Course
      • Cloud Associate Course
      • Azure Fundamental Course
      • Azure Administrator Course
      Digital Marketing Training
      • Digital Marketing Course
      • SMM Course TOP
      • PPC Expert Course
      • Advanced SEO Course
      • SMO Course OFFER
      DB Management Training
      • MSSQL Course
      • Core MYSQL OFFER
      • Oracle Fundamentals Course
      • Oracle DBA Course
      • Oracle PL SQL Course
      Professional Courses
      Programming Training
      • Programming Course TOP
      • Advanced Java Course
      • Advanced Python Course
      Full Stack Training
      • MERN Stack Course
      • MEAN Stack Course
      Mobile App Training
      • Android Course
      • IOS CourseOFFER
      • Flutter & Dart Course
      • React Native CourseOFFER
      Cyber Security Training
      • Hacking Defender Course
      • Security+ Course
      • Security Analyst+ Course
      • Elynux Essentials Course
      Networking Training
      • CCNA - Cisco Solutions
      • CCNP - Switching , Routing
      • Hardware A+ & Network N+
      DB Management Training
      • MySQL & MSSQL Course
      • Oracle DB Management
      Software Test Training
      • Software Test Expert Course TOP
      • Automation Testing TOP
      Data Science & Analyst
      • Python for Data Science-ML
      • DA- (R,Tableau & Power BI)
      Cloud Computing Training
      • Cloud Solution Architect Course
      • DevOps Professional Course
      • Cloud DevOps Engineer Course
      Crash Courses
      Programming Training
      • C & C++ Programming Course
      • Java Course OFFER
      • Python Course
      • Core PHP Course
      • UI Development Course
      • AngularJs Course
      • NodeJs Course
      • ReactJs Course
      • Wordpress Course
      • .Net Course TOP
      • Go Programming Course
      • Perl Programming Course
      • C# Programming CourseOFFER
      Business Management Course
      • Microsoft Office Course
      • Excel for Enterprises Course
      Testing Training
      • Selenium Java Course
      • Selenium Python Course
      • Manual Tester - ISTQB Course
      Security Training
      • Hardware A+ Course
      • Cloud Associate Course
      • Azure Fundamental Course
      • Azure Administrator Course
      Digital Marketing Training
      • Digital Marketing Course
      • SMM Course TOP
      • PPC Expert Course
      • Advanced SEO Course
      • SMO Course OFFER
      DB Management Training
      • MSSQL Course
      • Core MYSQL OFFER
      • Oracle Fundamentals Course
      • Oracle DBA Course
      • Oracle PL SQL Course
      AI Mastery Program
      • AI Engineering For Developers
      • AI Power Digital Marketing
      • AI Mastery For Entrepreneurs Programme
  • Support
    • Placement Training
    • Career Guidance
    • Appointment Booking
    • Help Center
    • Tech Blog
    • Elysium Spark Notes
    • MicroBookShelf
    • Elysium CodeSheet
    • Interview Question
    • Download
    • Ask Elsa
    • Franchise Oppurtunity 
    • Classmate App
  • Contact Us
      • Madurai
      • Chennai - CIT Nagar
      • Tirunelveli
      • Virudhunagar
      • Perambalur
      • Trichy
      • Theni
      • Coimbatore - Hopes
      • Hosur
      • Tiruppur

      Contact Us

      • 227, IInd Floor, B Block, Elysium Campus, Church Rd, Anna Nagar, Madurai, Tamil Nadu 625020
      • 096777 81155, 096777 24437
      • +91 (0452) 4353702
      • info@elysiumacademy.org
      Madurai
      View More

      Contact Us

      • 12,North Road, near Nandhi Statue,CIT Nagar West, Chennai,Tamilnadu 600035
      • 9941161919
      • 089393 90929
      • chn.cit@elysiumacademy.org
      Chennai
      View More

      Contact Us

      • Castro Palace, 48/5, S Bypass Rd, Xavier Colony, Vasanth Nagar, Tirunelveli, Tamil Nadu 627005
      • 09488126688
      • tnv@elysiumacademy.org
      Tirunelveli
      View More

      Contact Us

      • 1/2A, AA Road, near Head Post Office, MGR Nagar, Anna Nagar, Virudhunagar, Tamil Nadu 626001
      • 08903390051
      • vnr@elysiumacademy.org
      Viruthunagar
      View More

      Contact Us

      • 1/2A, AA Road, near Head Post Office, MGR Nagar, Anna Nagar, Virudhunagar, Tamil Nadu 626001
      • 08903390051
      • vnr@elysiumacademy.org
      • Open 24 Hours
      Madurai
      View More

      Contact Us

      • 2nd Floor, Ponmanam Plaza, above Reliance Trends, near New Bus Stand, Thuraimangalam, Perambalur, Tamil Nadu 621212
      • +91 94422 20202
      • pbr@elysiumacademy.org
      Perambalur
      View More

      Contact Us

      • 2nd Floor, Jaishree Towers, C-142, 9A Cross Rd, above SBI Bank6th Cross East, Thillai Nagar East, West Thillai Nagar, Tennur, Tiruchirappalli, Tamil Nadu 620018
      • +91 9952887895
      • try@elysiumacademy.org
      tiruchy
      View More

      Contact Us

      • D. No.635/A, 3rd Floor, Near State Bank of India, Periyakulam Road, Theni
      • 78978 94002
      • 78978 95002
      • teni@elysiumacademy.org
      contact theni img
      View More

      Contact Us

      • 62, Suriya Complex, Gandhi Street, Thaneerpanthal Road, BR Puram, Hope College,
        Coimbatore -641 004. Landmark – Opp GRG School Ground
      • +91 96777 04758
      • +91 96777 04785
      • cbe.hopes@elysiumacademy.org
      contact cbe hopes img
      View More

      Contact Us

      • First Floor, No. 16, F/8, Hosur - Krishnagiri Rd, adjacent to Ameeria petrol bunk, Hosur, Tamil Nadu 635109
      • +91 99947 82270
      • hsr@elysiumacademy.org
      contact hosur img
      View More

      Contact Us

      • No.9/3C, Mariamman koil street, Padmavathipuram, SAP Theatre opposite, Tiruppur - 641603.
      • +91 7397391713
      • +91 7397391318
      • tup@elysiumacademy.org
      software training institutes
      View More
  • About Us
    • Academy Overview
    • Mission & Vission
    • Foot Steps
    • Our Pillars
    • Gallery
    • Testimonials
      • Video Testimonials
      • Reviews
    • Our Awards
  • Tesbo Courses
      Tesbo Courses PREMIUM
      • Full Stack JS Programmer Course
      • Full Stack Core Programmer
      • Full Stack Native Programmer
      • Data Analyst CourseOFFER
      • Testing Expert CourseOFFER
      • Mobile App Developer Course
      • IT Infra Manager
      • Cloud Architect Course
      • DevOps Engineer Course
      • Digital Marketing CourseOFFER
      Slash CoursesBUDGET
      • Core C & C++ Coures
      • Core Java & Concepts Course
      • Core Python & Concepts Course OFFER
      • Core UI Development Course
      • Microsoft Office Course
      • CompTIA – Hardware A+ Course
      Classic Courses BUDGET
      • Core C & C++ Coures
      • Core Java & Concepts Course
      • Core Python & Concepts Course OFFER
      • Core MSSQL Course
      • Digital Marketing Courses
      mega-menu
  • Professional Course
      Professional Courses
      Programming Training
      • Programming Course TOP
      • Advanced Java Course
      • Advanced Python Course
      Full Stack Training
      • MERN Stack Course
      • MEAN Stack Course
      Mobile App Training
      • Android Course
      • IOS CourseOFFER
      • Flutter & Dart Course
      • React Native CourseOFFER
      Cyber Security Training
      • Hacking Defender Course
      • Security+ Course
      • Security Analyst+ Course
      • Elynux Essentials Course
      Networking Tranining
      • CCNA - Cisco Solutions
      • CCNP - Switching , Routing
      • Hardware A+ & Network N+
      DB Management Training
      • MySQL & MSSQL Course
      • Oracle DB Management
      Software Testing
      • ISTQB Course TOP
      • Automation Testing TOP
      Data Science & Analyst
      • Python for Data Science-ML
      • DA- (R,Tableau & Power BI)
      Cloud Computing Training
      • Cloud Practioner Course
      • Cloud Solution Architect Course
      • DevOps Professional Course
      • Cloud DevOps Engineer Course
      Crash Courses
      Programming Training
      • C++ Programming Course
      • Java Course OFFER
      • Python Course
      • UI Development Course
      • AngularJs Course
      • NodeJs Course
      • ReactJs Course
      • Wordpress Course
      • .Net Course TOP
      • Go Programming Course
      • Perl Programming Course
      • C# Programming CourseOFFER
      Business Management Course
      • Microsoft Office Course
      • Excel for Enterprises Course
      Testing Training
      • Selenium Java Course
      • Selenium Python Course
      Security Training
      • Hardware A+ Course
      • Cloud Associate Course
      • Azure Fundamental Course
      • Azure Administrator Course
      Digital Marketing Training
      • Digital Marketing Course
      • SMM Course TOP
      • PPC Expert Course
      • Advanced SEO Course
      • SMO Course OFFER
      DB Management Training
      • MSSQL Course
      • Core MYSQL OFFER
      • Oracle Fundamentals Course
      • Oracle DBA Course
      • Oracle PL SQL Course
      Professional Courses
      Programming Training
      • Programming Course TOP
      • Advanced Java Course
      • Advanced Python Course
      Full Stack Training
      • MERN Stack Course
      • MEAN Stack Course
      Mobile App Training
      • Android Course
      • IOS CourseOFFER
      • Flutter & Dart Course
      • React Native CourseOFFER
      Cyber Security Training
      • Hacking Defender Course
      • Security+ Course
      • Security Analyst+ Course
      • Elynux Essentials Course
      Networking Training
      • CCNA - Cisco Solutions
      • CCNP - Switching , Routing
      • Hardware A+ & Network N+
      DB Management Training
      • MySQL & MSSQL Course
      • Oracle DB Management
      Software Test Training
      • Software Test Expert Course TOP
      • Automation Testing TOP
      Data Science & Analyst
      • Python for Data Science-ML
      • DA- (R,Tableau & Power BI)
      Cloud Computing Training
      • Cloud Solution Architect Course
      • DevOps Professional Course
      • Cloud DevOps Engineer Course
      Crash Courses
      Programming Training
      • C & C++ Programming Course
      • Java Course OFFER
      • Python Course
      • Core PHP Course
      • UI Development Course
      • AngularJs Course
      • NodeJs Course
      • ReactJs Course
      • Wordpress Course
      • .Net Course TOP
      • Go Programming Course
      • Perl Programming Course
      • C# Programming CourseOFFER
      Business Management Course
      • Microsoft Office Course
      • Excel for Enterprises Course
      Testing Training
      • Selenium Java Course
      • Selenium Python Course
      • Manual Tester - ISTQB Course
      Security Training
      • Hardware A+ Course
      • Cloud Associate Course
      • Azure Fundamental Course
      • Azure Administrator Course
      Digital Marketing Training
      • Digital Marketing Course
      • SMM Course TOP
      • PPC Expert Course
      • Advanced SEO Course
      • SMO Course OFFER
      DB Management Training
      • MSSQL Course
      • Core MYSQL OFFER
      • Oracle Fundamentals Course
      • Oracle DBA Course
      • Oracle PL SQL Course
      AI Mastery Program
      • AI Engineering For Developers
      • AI Power Digital Marketing
      • AI Mastery For Entrepreneurs Programme
  • Support
    • Placement Training
    • Career Guidance
    • Appointment Booking
    • Help Center
    • Tech Blog
    • Elysium Spark Notes
    • MicroBookShelf
    • Elysium CodeSheet
    • Interview Question
    • Download
    • Ask Elsa
    • Franchise Oppurtunity 
    • Classmate App
  • Contact Us
      • Madurai
      • Chennai - CIT Nagar
      • Tirunelveli
      • Virudhunagar
      • Perambalur
      • Trichy
      • Theni
      • Coimbatore - Hopes
      • Hosur
      • Tiruppur

      Contact Us

      • 227, IInd Floor, B Block, Elysium Campus, Church Rd, Anna Nagar, Madurai, Tamil Nadu 625020
      • 096777 81155, 096777 24437
      • +91 (0452) 4353702
      • info@elysiumacademy.org
      Madurai
      View More

      Contact Us

      • 12,North Road, near Nandhi Statue,CIT Nagar West, Chennai,Tamilnadu 600035
      • 9941161919
      • 089393 90929
      • chn.cit@elysiumacademy.org
      Chennai
      View More

      Contact Us

      • Castro Palace, 48/5, S Bypass Rd, Xavier Colony, Vasanth Nagar, Tirunelveli, Tamil Nadu 627005
      • 09488126688
      • tnv@elysiumacademy.org
      Tirunelveli
      View More

      Contact Us

      • 1/2A, AA Road, near Head Post Office, MGR Nagar, Anna Nagar, Virudhunagar, Tamil Nadu 626001
      • 08903390051
      • vnr@elysiumacademy.org
      Viruthunagar
      View More

      Contact Us

      • 1/2A, AA Road, near Head Post Office, MGR Nagar, Anna Nagar, Virudhunagar, Tamil Nadu 626001
      • 08903390051
      • vnr@elysiumacademy.org
      • Open 24 Hours
      Madurai
      View More

      Contact Us

      • 2nd Floor, Ponmanam Plaza, above Reliance Trends, near New Bus Stand, Thuraimangalam, Perambalur, Tamil Nadu 621212
      • +91 94422 20202
      • pbr@elysiumacademy.org
      Perambalur
      View More

      Contact Us

      • 2nd Floor, Jaishree Towers, C-142, 9A Cross Rd, above SBI Bank6th Cross East, Thillai Nagar East, West Thillai Nagar, Tennur, Tiruchirappalli, Tamil Nadu 620018
      • +91 9952887895
      • try@elysiumacademy.org
      tiruchy
      View More

      Contact Us

      • D. No.635/A, 3rd Floor, Near State Bank of India, Periyakulam Road, Theni
      • 78978 94002
      • 78978 95002
      • teni@elysiumacademy.org
      contact theni img
      View More

      Contact Us

      • 62, Suriya Complex, Gandhi Street, Thaneerpanthal Road, BR Puram, Hope College,
        Coimbatore -641 004. Landmark – Opp GRG School Ground
      • +91 96777 04758
      • +91 96777 04785
      • cbe.hopes@elysiumacademy.org
      contact cbe hopes img
      View More

      Contact Us

      • First Floor, No. 16, F/8, Hosur - Krishnagiri Rd, adjacent to Ameeria petrol bunk, Hosur, Tamil Nadu 635109
      • +91 99947 82270
      • hsr@elysiumacademy.org
      contact hosur img
      View More

      Contact Us

      • No.9/3C, Mariamman koil street, Padmavathipuram, SAP Theatre opposite, Tiruppur - 641603.
      • +91 7397391713
      • +91 7397391318
      • tup@elysiumacademy.org
      software training institutes
      View More
Hero-Shape-1

Learn IT Skills at
Best Computer Learning Center

Elysium Academy is a premier computer learning center, offering courses in software, hardware, networking, and more for students and professionals.

Get a free consultation!
Submit

Thank you!

We will contact you soon.

Hero-Shape-2
Hero-Shape-3
Hero-Shape-1

2.2

Version

45 Hours

Duration

11 Hours

Theory

34 Hours

Practical
Rating
4.8/5 Rating
1-to-1
1 to 1 Guidance
24-7
Support Available 24/7
Hiring-Partners
100+ Hiring Partners
Why Choose Us

Azure Training Insititute

Tailored modules for all levels with one-on-one doubt clearing, plus resume building, interview prep, and job placement support.

  • Learn from experienced professionals with years of industry expertise.
  • Get practical experience with real-world projects and exercises.
  • We offer flexible class schedules to accommodate working professionals.
  • Receive career support and placement assistance with leading tech companies.
90+ Professional Courses

Empower your future with Python programming.

Top Instructors

Experience-driven teaching for your growth.

Online Certifications

Empowering careers with certified expertise.

POPULAR COURSES

Explore Our Courses

Elysium Certified Digital Marketing - Training Course
Crash Course
Software Development Training Course
Elysium Certified Digital Marketing – Training Course

Master the art of digital marketing with comprehensive training, covering SEO, SEM, content marketing, and more, to boost your career.

Entroll Now
Elysium Certified Full Stack Core Programmer - Training Course
Tesbo Course
Software Development Training Course
Elysium Certified Full Stack Core Programmer – Training Course

Unlock your potential in full stack development with our intensive Core Programming course. Gain proficiency in both front-end and back-end.

Entroll Now
CompTIA – Security+ (SY0-601) Course
Professional Course
Cybersecurity and Networking Course
CompTIA – Security+ (SY0-601) Training Course

Master the fundamentals of cybersecurity with our CompTIA Security+ (SY0-601) training course, designed to enhance your skills.

Entroll Now
Mobile App developer Course - IoS
Professional Course
Mobile App Developer Course
Mobile App Developer Training Course – IoS

Master iOS development and create powerful apps with our comprehensive training course. Start your journey.

Entroll Now
  • Overview
  • Course Details
  • Syllabus
  • FAQ

Acquire Key Security Skills: Master Cybersecurity, Earn Certification, Launch Your IT Security Career!

BEST INSTITUTE 4.9 Ratings

google

Elysium Academy has firmly positioned itself at the forefront of the cybersecurity education sector. Our meticulously designed course provides an in-depth, all-encompassing curriculum that prepares participants to tackle the complex landscape of modern cybersecurity threats. With a blend of theoretical knowledge and practical skills, this course ensures that students are well-equipped to safeguard information systems and respond effectively to security incidents.

2.2

Version

90 Hours

Duration

20 Hours

Theory

70 Hours

Practical
Version

2.2

Duration

65 Hours

Theory

12 Hours

Practical

65 Hours

Our Highlights
  • Industry Based Projects
  • Personalized coordinator.
  • Trainer feedback.
  • Trainer availability post sessions.
  • Get your staff certified.
  • Certificate from governing bodies.
  • Globally Recognized Certification
  • Hands on assignment
What Will You Learn?
  • Master cybersecurity fundamentals, including risk management, network security, and compliance.
  • Dive into advanced concepts such as threat analysis and incident response.
  • Learn to implement secure network protocols and architectures.
  • Gain expertise in cryptographic techniques and PKI.
  • Understand and apply security policies and regulations
  • Develop practical skills through hands-on labs and real-world simulations.

Top companies offer this course to their employees

Course was selected for our collection of top-rated courses trusted by businesses worldwide. 

sonata
weblineindia
eclerx
Capgemini
mphasis
Reasons to do CompTIA – Security+ (SY0-601) Course Certification Training
Icon-01
Salary

PER ANNUM

₹ 5.5 L
Icon-02
Job Growth

Current Month

28%
Icon-03
Offer Jobs

2026

9,000+
Course Description

The CompTIA Security+ (SY0-601) program offers learners the opportunity to gain essential skills in cybersecurity, equipping them to protect, detect, and respond to security threats effectively. Dive into the critical field of cybersecurity and learn about network security, cryptography, risk management, and more with the guidance of experienced instructors. Learners will emerge prepared to tackle real-world cybersecurity challenges.

Course Goals

The Security+ course teaches you to master the concepts of cybersecurity. Through this Security+ training, you will learn Threat Analysis, Incident Response, Network Security, Cryptography, and Compliance.

Future Scope of this Course
  • Cybersecurity is the protective infrastructure set-up that safeguards data.
  • Cybersecurity is the comprehensive study of protecting data collected by various organizations.
  • Incident Response is where security breaches will be addressed, and vulnerabilities mitigated.
  • Security Analysts understand cybersecurity threats and derive actionable insights.
  • Cybersecurity is the foundation on which secure systems and networks are built.
Our Career Service
Job-Assistance
Student Job Assistance
Interview-Preperation
Interview Preparation
Profile-Building
Resume Profile Building
Support-&-Guidance
Support and Guidance
Expertise-and-Knoiwledge
Expertise and Knowledge
Interview-Based-Training
Interview Based Training
CompTIA – Security+ (SY0-601) Course Certificate
Certificate-Mock-Up
Our Training Program Benefits
  • Live, interactive training by experts.
  • Curriculum that focuses on the learner.
  • Challenge-based, hands-on project.
  • Opportunities for team building.
  • Cost- saving training.
  • Convenient for your employees.
  • Completely tailor-made curriculum.
Chapter-1 Different Types of Social Engineering Techniques
Different Types of Social Engineering Techniques
  • Phishing
  • Smishing
  • Vishing
  • Spam
  • Spam over instant messaging (SPIM)
  • Spear phishing
  • Dumpster diving
  • Shoulder surfing
  • Pharming
  • Tailgating
  • Eliciting information
  • Whaling
  • Prepending
  • Identity fraud
  • Invoice scams
  • Credential harvesting
  • Reconnaissance
  • Hoax
  • Impersonation
  • Watering hole attack
  • Typosquatting
  • Pretexting
  • Influence campaigns
  • Hybrid Warfare
  • Social Media
Principles (reasons for effectiveness)
  • Authority
  • Intimidation
  • Consensus
  • Scarcity
  • Familiarity
  • Trust
  • Urgency
Chapter-2 Analyze Potential Indicators to Determine the Type of Attack
Malware
  • Ransomware
  • Trojans
  • Worms
  • Potentially unwanted programs (PUPs)
  • Fileless virus
  • Command and control
  • Bots
  • Cryptomalware
  • Logic bombs
  • Spyware
  • Keyloggers
  • Remote access Trojan (RAT)
  • Rootkit
  • Backdoor
  • Password attacks
Password attacks
  • Spraying
  • Dictionary
  • Brute Force
  • Offline
  • Online
  • Rainbow table
  • Plaintext/unencrypted
Physical attacks
  • Malicious Universal
  • Serial Bus (USB) cable
  • Malicious flash drive
  • Card cloning
  • Skimming
Adversarial artificial intelligence (AI)
  • Tainted training data for machine learning (ML)
  • Security of machine learning algorithms
  • Supply-chain attacks
  • Cloud based vs. on-premises attacks
  • Crytographic attacks
  • Birthday
  • Collision
  • Downgrade
Chapter-3 Analyze Potential Indicators Application Attacks
  • Privilege escalation
  • Cross-site scripting
  • Injections
  • Structured query language (SQL)
  • Dynamic-link library (DLL)
  • Lightweight Directory Access Protocol (LDAP)
  • Extensible Markup Language (XML)
  • Pointer/object dereference
  • Directory traversal
  • Buffer overflows
  • Race conditions
  • Time of check/time of use (TOC/TOU)
  • Error handling
  • Improper input handling
  • Replay attack
  • Integer overflow
  • Request forgeries
  • Server-side
  • Cross-site
  • Application programming interface (API) attacks
  • Resource exhaustion
  • Memory leak
  • Secure Sockets Layer (SSL) stripping
  • Driver manipulation
  • Shimming
  • Refactoring
  • Pass the hash
Chapter-4 Analyze Potential Indicators Network Attacks
Analyze Potential Indicators Network Attacks Wireless
  • Radio frequency identification (RFID)
  • Near-field communication (NFC)
  • Initialization vector (IV)
  • On-path attack (previously known as man-in-the-middle attack / man-in-the-browser attack)
Layer 2 attacks
  • Address Resolution Protocol (ARP) poisoning
  • Media access control (MAC) flooding
  • MAC cloning
Domain name system (DNS)
  • Domain hijacking
  • DNS poisoning
  • Uniform Resource Locator (URL) redirection
  • Domain reputation
Distributed denial-of-service (DDoS)
  • Network
  • Application
  • Operational technology (OT)
Malicious code or script execution
  • PowerShell
  • Python
  • Bash
  • Macros
  • Visual Basic for Applications (VBA)
Chapter-5 Different Threat Actors, Vectors, and Intelligence Sources
Actors and Threats
  • Advanced persistent threat (APT)
  • Insider threats
  • State actors
  • Hacktivists
  • Script kiddies
  • Criminal syndicates
  • Hackers
  • Authorized
  • Unauthorized
  • Semi-authorized
Attributes of Actors
  • Internal/external
  • Level of sophistication/capability
  • Resources/funding
  • Intent/motivation
Vectors
  • Direct access
  • Wireless
  • Email
  • Supply chain
  • Social media
  • Removable media
  • Cloud
Threat Intelligence Sources
  • Open-source intelligence (OSINT)
  • Closed/proprietary
  • Vulnerability databases
  • Public/private information-sharing centers
  • Dark web
  • Indicators of compromise
  • Automated Indicator Sharing (AIS)
  • Structured Threat Information eXpression (STIX) / Trusted Automated eXchange of Intelligence Information (TAXII)
  • Predictive analysis
  • Threat maps
  • File/code repositories
Research Sources
  • Vendor websites
  • Vulnerability feeds
  • Conferences
  • Academic journals
  • Request for comments (RFC)
  • Local industry groups
  • Social media
  • Threat feeds
  • Adversary tactics, techniques, and procedures (TTP)
Chapter-6 Various Types of Vulnerabilities
Various Types of Vulnerabilities
  • Cloud-based vs. on-premises vulnerabilities
  • Zero-day
  • Weak configurations
  • Open permissions
  • Unsecure root accounts
  • Errors
  • Weak encryption
  • Unsecure protocols
  • Default settings
  • Open ports and services
  • Third-party risks
  • Vendor management
  • System integration
  • Lack of vendor support
  • Supply chain
  • Outsourced code development
  • Data storage
  • Improper or weak patch management
  • Firmware
  • Operating system (OS)
  • Applications
  • Legacy platforms
Impacts
  • Data loss
  • Data breaches
  • Data exfiltration
  • Identity theft
  • Financial
  • Reputation
  • Availability loss
Chapter-7 Security Assessments

 

  • Threat hunting
  • Intelligence fusion
  • Threat feeds
  • Advisories and bulletins
  • Maneuver
  • Vulnerability scans
  • False positives
  • False negatives
  • Log reviews
  • Credentialed vs. non-credentialed
  • Intrusive vs. non-intrusive
  • Application
  • Web application
  • Network
  • Common Vulnerabilities and Exposures (CVE) / Common Vulnerability Scoring System (CVSS)
  • Configuration review
  • Syslog/Security information and event management (SIEM)
  • Review reports
  • Packet capture
  • Data inputs
  • User behavior analysis
  • Sentiment analysis
  • Security monitoring
  • Log aggregation
  • Log collectors
  • Security orchestration, automation, and response (SOAR)
Chapter-8 Penetration Testing
Penetration Testing
  • Penetration testing
  • Known environment
  • Unknown environment
  • Partially known environment
  • Rules of engagement
  • Lateral movement
  • Privilege escalation
  • Persistence
  • Cleanup
  • Bug bounty
  • Pivoting
  • Passive and active reconnaissance
  • Drones
  • War flying
  • War driving
  • Footprinting
  • OSINT
  • Exercise types
  • Red-team
  • Blue-team
  • White-team
  • Purple-team
Chapter-9 Importance of Security Concepts
Importance of Security Concepts
  • Configuration management
  • Diagrams
  • Baseline configuration
  • Standard naming conventions
  • Internet protocol (IP) schema
  • Data sovereignty
  • Data protection
  • Data loss prevention (DLP)
  • Masking
  • Encryption
  • At rest
  • In transit/motion
  • In processing
  • Tokenization
  • Rights management
  • Geographical considerations
  • Response and recovery controls
  • Secure Sockets Layer (SSL) / Transport Layer Security (TLS) inspection
  • Hashing
  • API considerations
  • Site resiliency
  • Hot site
  • Cold site
  • Warm site
  • Deception and disruption
  • Honeypots
  • Honeyfiles
  • Honeynets
  • Fake telemetry
  • DNS sinkhole
Chapter-10 Cloud Computing Concepts
Cloud Computing Concepts
  • Cloud models
  • Infrastructure as a service (IaaS)
  • Platform as a service (PaaS)
  • Software as a service (SaaS)
  • Anything as a service (XaaS)
  • Public
  • Community
  • Private
  • Hybrid
  • Cloud service providers
  • Managed service provider (MSP) / managed security service provider (MSSP)
  • On-premises vs. off-premises
  • Fog computing
  • Edge computing
  • Thin client
  • Containers
  • Microservices/APIs
  • Infrastructure as code
  • Software-defined networking (SDN)
  • Software-defined visibility (SDV)
  • Serverless architecture
  • Services integration
  • Transit gateway
  • Virtualization
  • Virtual machine (VM)
  • Sprawl avoidance
  • VM escape protection
Chapter-11 Automation Concepts
Environment
  • Development
  • Test
  • Staging
  • Production
  • Quality assurance (QA)
  • Provisioning and deprovisioning
  • Integrity measurement
  • Secure coding techniques
  • Normalization
  • Stored procedures
  • Obfuscation/camouflage
  • Code reuse/dead code
  • Server-side vs. client-side execution and validation
  • Memory management
  • Use of third-party libraries and SDKs
  • Data exposure
  • Open Web Application Security Project (OWASP)
  • Software diversity
  • Compiler
  • Binary
  • Automation/scripting
  • Automated courses of action
  • Continuous monitoring
  • Continuous validation
  • Continuous integration
  • Continuous delivery
  • Continuous deployment
  • Elasticity
  • Scalability
  • Version control
Chapter-12 IAM Concepts
Authentication methods
  • Directory services
  • Federation
  • Attestation
  • Technologies
  • Time-based one-time password (TOTP)
  • HMAC-based one-time password (HOTP)
  • Short message service (SMS)
  • Token key
  • Private
  • Hybrid
  • Cloud service providers
  • Managed service provider (MSP) / managed security service provider (MSSP)
  • On-premises vs. off-premises
  • Fog computing
  • Edge computing
  • Thin client
  • Containers
  • Microservices/AP
  • Infrastructure as code
  • Software-defined networking (SDN)
  • Software-defined visibility (SDV)
  • Serverless architecture
  • Services integration
  • Transit gateway
  • Virtualization
  • Virtual machine (VM)
  • Sprawl avoidance
  • VM escape protection
  • Something you exhibit
  • Someone you know
  • Authentication, authorization, and accounting (AAA)
  • Cloud vs. on-premises requirements
Chapter-13 Implement Cybersecurity Resilience
Implement Cybersecurity Resilience
  • Redundancy
  • Geographic dispersal
  • Disk
  • Redundant array of inexpensive disks (RAID) levels
  • Multipath
  • Network
  • Load balancers
  • Network interface card (NIC) teaming
  • Power
  • Uninterruptible power supply (UPS)
  • Generator
  • Dual supply
  • Managed power distribution units (PDUs)
  • Replication
  • Storage area network
  • VM
  • On-premises vs. cloud
  • Backup types
  • Full
  • Incremental
  • Snapshot
  • Differential
  • Tape
  • Disk
  • Copy
  • Network-attached storage (NAS)
  • Storage area network
  • Cloud
  • Image
  • Online vs. offline
  • Offsite storage
  • Distance considerations
  • Non-persistence
  • Revert to known state
  • Last known-good configuration
  • Live boot media
  • High availability
  • Scalability
  • Restoration order
  • Diversity
  • Technologies
  • Vendors
  • Crypto
  • Controls
Chapter - 14 Embedded and Specialized Systems
Embedded and Specialized Systems
  • Raspberry Pi
  • Field-programmable gate array (FPGA)
  • Arduino
  • Supervisory control and data acquisition (SCADA) / industrial control system (ICS)
  • Facilities
  • Industrial
  • Manufacturing
  • Energy
  • Logistics
  • Internet of Things (IoT)
  • Sensors
  • Smart devices
  • Wearables
  • Facility automation
  • Weak defaults
  • Specialized
  • Medical systems
  • Vehicles
  • Aircraft
  • Smart meters
  • Voice over IP (VoIP)
  • Heating, ventilation, air conditioning (HVAC)
  • Drones
  • Multifunction printer (MFP)
  • Real-time operating system (RTOS)
  • Surveillance systems
  • System on chip (SoC)
  • Communication considerations
  • 5G
  • Narrow-band
  • Baseband radio
  • Subscriber identity module (SIM) cards
  • Zigbee
Chapter - 15 Physical Security Controls
Physical Security Measures
  • Bollards/Barricades
  • Access Control Vestibules
  • Badges
  • Alarms
  • Signage
  • Cameras
  • Motion recognition
  • Object detection
  • Closed-circuit television (CCTV)
  • Industrial Camouflage
  • Personnel
  • Guards
  • Robot sentries
  • Reception
  • Two-person integrity/control
  • Locks
  • Biometrics
  • Electronic
  • Physical
  • Cable locks
  • USB Data Blocker
  • Lighting
  • Fencing
  • Fire Suppression
  • Sensors
  • Motion detection
  • Noise detection
  • Proximity reader
  • Moisture detection
  • Cards
  • Temperature
  • Drones
  • Visitor Logs
  • Faraday Cages
  • Air Gap
  • Screened Subnet (previously known as Demilitarized Zone)
  • Protected Cable Distribution
  • Secure Areas
  • Air gap
  • Vault
  • Safe
  • Hot aisle
  • Cold aisle
  • Secure Data Destruction
  • Burning
  • Shredding
  • Pulping
  • Pulverizing
  • Degaussing
  • Third-party solutions
Chapter - 16 Cryptographic Concepts
  • Digital Signatures
  • Key Length
  • Key Stretching
  • Salting
  • Hashing
  • Key Exchange
  • Elliptic-Curve Cryptography
  • Perfect Forward Secrecy
  • Quantum
  • Communications
  • Computing
  • Post-Quantum
  • Ephemeral
  • Modes of Operation
  • Authenticated
  • Unauthenticated
  • Counter
  • Blockchain
  • Public Ledgers
  • Cipher Suites
  • Stream
  • Block
  • Symmetric vs. Asymmetric
  • Lightweight Cryptography
  • Steganography
  • Audio
  • Video
  • Image
  • Homomorphic Encryption
  • Common Use Cases
  • Low Power Devices
  • Low Latency
  • High Resiliency
  • Supporting Confidentiality
  • Supporting Integrity
  • Supporting Obfuscation
  • Supporting Authentication
  • Supporting Non-Repudiation
  • Limitations
  • Speed
  • Size
  • Weak Keys
  • Time
  • Longevity
  • Predictability
  • Reuse
  • Entropy
  • Computational Overheads
  • Resource vs. Security Constraints
Chapter - 17 Implement Secure Protocols

Protocols

  • Domain Name System Security Extensions (DNSSEC)
  • SSH (Secure Shell)
  • Secure/Multipurpose Internet Mail Extensions (S/MIME)
  • Secure Real-time Transport Protocol (SRTP)
  • Lightweight Directory Access Protocol Over SSL (LDAPS)
  • File Transfer Protocol, Secure (FTPS)
  • SSH File Transfer Protocol (SFTP)
  • Simple Network Management Protocol, version 3 (SNMPv3)
  • Hypertext Transfer Protocol over SSL/TLS (HTTPS)
  • IPSec (Internet Protocol Security)
  • Authentication Header (AH) / Encapsulating Security Payloads (ESP)
  • Tunnel/Transport
  • Post Office Protocol (POP) / Internet Message Access Protocol (IMAP)

Use cases

  • Voice and video
  • Time synchronization
  • Email and web
  • File transfer
  • Directory services
  • Remote access
  • Domain name resolution
  • Routing and switching
  • Network address allocation
  • Subscription services
Chapter 18 - Host or Application Security Solutions
Host or Application Security Solutions
  • Endpoint protection
  • Antivirus
  • Anti-malware
  • Endpoint detection and response (EDR)
  • Data loss prevention (DLP)
  • Next-generation firewall (NGFW)
  • Host-based intrusion prevention system (HIPS)
  • Host-based intrusion detection system (HIDS)
  • Host-based firewall
  • Boot integrity
  • Boot security/Unified Extensible Firmware Interface (UEFI)
  • Measured boot
  • Boot attestation
  • Database security
  • Tokenization
  • Salting
  • Hashing
  • Application security
  • Input validations
  • Secure cookies
  • Hypertext Transfer Protocol (HTTP) headers
  • Code signing
  • Allow list
  • Block list/deny list
  • Secure coding practices
  • Static code analysis
  • Manual code review
  • Dynamic code analysis
  • Fuzzing
  • Hardening
  • Open ports and services
  • Registry
  • Disk encryption
  • OS security
  • Patch management
  • Third-party updates
  • Auto-update
  • Self-encrypting drive (SED)/full-disk encryption (FDE)
  • Opal
  • Hardware root of trust
  • Trusted Platform Module (TPM)
  • Sandboxing
Chapter 19 - Secure Network Designs
Load Balancing
  • Active/active
  • Active/passive
  • Scheduling
  • Virtual IP
  • Persistence
Network Segmentation
  • Virtual local area network (VLAN)
  • Screened subnet (previously known as demilitarized zone)
  • East-west traffic
  • Extranet
  • Intranet
  • Zero Trust
  • Virtual Private Network (VPN)
  • Always-on
  • Split tunnel vs. full tunnel
  • Remote access vs. site-to-site
  • IPSec
  • SSL/TLS
  • HTML5
  • Layer 2 tunneling protocol (L2TP)
  • DNS
  • Network Access Control (NAC)
  • Agent and agentless
  • Out-of-band Management
  • Port Security
  • Network Appliances
  • Jump servers
  • Proxy servers
  • Forward
  • Reverse
  • Network-based intrusion detection system (NIDS) / network-based intrusion prevention system (NIPS)
  • Signature-based
  • Heuristic/behavior
  • Anomaly
  • Inline vs. passive
  • HSM
  • Sensors
  • Collectors
  • Aggregators
  • Firewalls
  • Web application firewall (WAF)
  • Next-generation firewall (NGFW)
  • Stateful
  • Stateless
  • Unified threat management (UTM)
  • Network address translation (NAT) gateway
  • Content/URL filter
  • Open-source vs. proprietary
  • Hardware vs. software
  • Appliance vs. host-based vs. virtual
  • Access Control List (ACL)
  • Route Security
  • Quality of Service (QoS)
  • Implications of IPv6
  • Port Spanning/Port Mirroring
  • Port taps
  • Monitoring Services
  • File Integrity Monitors
Chapter 20 - Install and Configure Wireless Security Settings
Cryptographic Protocols
  • WiFi Protected Access 2 (WPA2)
  • WiFi Protected Access 3 (WPA3)
  • Counter-mode/CBC-MAC Protocol (CCMP)
  • Simultaneous Authentication of Equals (SAE)
Authentication Protocols
  • Extensible Authentication Protocol (EAP)
  • Protected Extensible Authentication Protocol (PEAP)
  • EAP-FAST
  • EAP-TLS
  • EAP-TTLS
  • IEEE 802.1X
Remote Authentication Dial-in User Service (RADIUS) Federation Methods
  • Pre-shared key (PSK) vs Enterprise vs Open
  • WiFi Protected Setup (WPS)
  • Captive portals
Installation Considerations
  • Site surveys
  • Heat maps
  • WiFi analyzers
  • Channel overlaps
  • Wireless access point (WAP) placement
  • Controller and access point security
Chapter 21 - Implement Secure Mobile Solutions
Implement Secure Mobile Solutions Connection Methods and Receivers
  • Cellular
  • WiFi
  • Bluetooth
  • NFC
  • Infrared
  • USB
  • Point-to-point
  • Point-to-multipoint
  • Global Positioning System (GPS)
  • RFID
Mobile Device Management (MDM)
  • Application management
  • Content management
  • Remote wipe
  • Geofencing
  • Geolocation
  • Screen locks
  • Push notifications
  • Passwords and PINs
  • Biometrics
  • Context-aware authentication
  • Containerization
  • Storage segmentation
  • Full device encryption
Mobile Devices
  • MicroSD hardware security module (HSM)
  • MDM/Unified Endpoint Management (UEM)
  • Mobile application management (MAM)
  • SEAndroid
Enforcement and Monitoring of
  • Third-party application stores
  • Rooting/jailbreaking
  • Sideloading
  • Custom firmware
  • Carrier unlocking
Deployment Models
  • Bring your own device (BYOD)
  • Corporate-owned personally enabled (COPE)
  • Choose your own device (CYOD)
  • Corporate-owned
  • Virtual desktop infrastructure (VDI)
Chapter 22 - Cybersecurity Solutions to the Cloud
Cloud Security Controls
  • High availability across zones
  • Resource policies
  • Secrets management
  • Integration and auditing
  • Storage permissions
  • Encryption
  • Replication
  • Network virtual networks
  • Public and private subnets
  • Segmentation
  • API inspection and integration
  • Compute security groups
  • Dynamic resource allocation
  • Instance awareness
  • Virtual private cloud (VPC) endpoint
  • Container security
Solutions
  • CASB (Cloud Access Security Broker)
  • Application security
  • Next-generation secure web gateway (SWG)
  • Firewall considerations in a cloud environment
  • Cost considerations
  • Need for segmentation
  • Open Systems Interconnection (OSI) layers
Chapter 23 - Identity and Account Management Controls

Identity

  • Identity provider (IdP)
  • Attributes
  • Certificates
  • Tokens
  • SSH keys
  • Smart cards

Account Types

  • User account
  • Shared and generic accounts/credentials
  • Guest accounts
  • Service accounts

Account Policies

  • Password complexity
  • Password history
  • Password reuse
  • Network location
  • Geofencing
  • Geotagging
  • Geolocation
  • Time-based logins
  • Access policies
  • Account permissions
  • Account audits
  • Impossible travel time/risky login
  • Lockout
  • Disablement
Chapter 24 - Authentication and Authorization Solutions

Authentication Management

  • Password Keys
  • Password Vaults
  • TPM (Trusted Platform Module)
  • HSM (Hardware Security Module)
  • Knowledge-Based Authentication

Authentication/Authorization

  • EAP (Extensible Authentication Protocol)
  • Challenge-Handshake Authentication Protocol (CHAP)
  • Password Authentication Protocol (PAP)
  • 802.1X
  • RADIUS
  • Single Sign-On (SSO)
  • Security Assertion Markup Language (SAML)
  • Terminal Access Controller Access Control System Plus (TACACS+)
  • OAuth
  • OpenID
  • Kerberos

Access Control Schemes

  • Attribute-Based Access Control (ABAC)
  • Role-Based Access Control (RBAC)
  • Rule-Based Access Control
Chapter 25 - Certificates
  • Types of Certificates
  • Machine/Computer
  • Email
  • User
  • Root
  • Domain Validation
  • Extended Validation
  • Certificate Formats
  • Distinguished Encoding Rules (DER)
  • Privacy Enhanced Mail (PEM)
  • Personal Information Exchange (PFX)
  • CER
  • P12
  • P7B
  • Concepts
  • Online vs. Offline CA
  • Stapling
  • Pinning
  • Trust Model
  • Key Escrow
  • Certificate Chaining
Chapter 26 - Assess Organizational Security

Network Reconnaissance and Discovery

  • tracert/traceroute
  • nslookup/dig
  • ipconfig/ifconfig
  • nmap
  • ping/pathping
  • hping
  • netstat
  • netcat
  • IP scanners
  • arp
  • route
  • curl
  • theHarvester
  • sn1per
  • scanless
  • dnsenum
  • Nessus
  • Cuckoo

File Manipulation

  • head
  • tail
  • cat
  • grep
  • chmod
  • logger

Shell and Script Environments

  • SSH
  • PowerShell
  • Python
  • OpenSSL

Packet Capture and Replay

  • Tcpreplay
  • Tcpdump
  • Wireshark

Forensics

  • dd
  • Memdump
  • WinHex
  • FTK Imager
  • Autopsy

Exploitation Frameworks

  • Introduction to Exploitation Frameworks

Password Crackers

  • Introduction to Password Crackers

Data Sanitization

  • Introduction to Data Sanitization
Chapter 27 - Policies, Processes, and Procedures for Incident Response
Incident Response Plans and Process
  • Preparation
  • Identification
  • Containment
  • Eradication
  • Recovery
  • Lessons Learned
Exercises
  • Tabletop
  • Walkthroughs
  • Simulations
Attack Frameworks
  • MITRE ATT&CK
  • The Diamond Model of Intrusion Analysis
  • Cyber Kill Chain
  • Stakeholder Management
  • Communication Plan
  • Disaster Recovery Plan
  • Business Continuity Plan
  • Continuity of Operations Planning (COOP)
  • Incident Response Team
  • Retention Policies
Chapter 28 - Data Sources to Support an Investigation
Data Sources to Support an Investigation
  • Vulnerability Scan Output
  • SIEM Dashboards
  • Sensor
  • Sensitivity
  • Trends
  • Alerts
  • Correlation
  • Log Files
  • Network
  • System
  • Application
  • Security
  • Web
  • DNS
  • Authentication
  • Dump Files
  • VoIP and Call Managers
  • Session Initiation Protocol (SIP) Traffic
  • syslog/rsyslog/syslog-ng
  • journalctl
  • NXLog
  • Bandwidth Monitors
  • Metadata
  • Configuration Changes
  • Firewall Rules
  • MDM
  • DLP
  • Content Filter/URL Filter
  • Update or Revoke Certificates
  • Isolation
  • Containment
  • Segmentation
Chapter 29 - Mitigation Techniques
Mitigation Techniques
  • Reconfigure Endpoint Security Solutions
  • Application Approved List
  • Application Blocklist/Deny List
  • Quarantine
  • Configuration Changes
  • Firewall Rules
  • MDM
  • DLP
  • Content Filter/URL Filter
  • Update or Revoke Certificates
  • Isolation
  • Containment
  • Segmentation
Chapter 30 - Key Aspects of Digital Forensics

Documentation/Evidence

  • Legal Hold
  • Video
  • Admissibility
  • Chain of Custody
  • Timelines of Sequence of Events
  • Time Stamps
  • Time Offset
  • Tags
  • Reports
  • Event Logs
  • Interviews

Acquisition

  • Order of Volatility
  • Disk
  • Random-Access Memory (RAM)
  • Swap/Pagefile
  • OS
  • Device
  • Firmware
  • Snapshot
  • Cache
  • Network
  • Artifacts

On-Premises vs. Cloud

  • Right-to-Audit Clauses
  • Regulatory/Jurisdiction
  • Data Breach Notification Laws

Integrity

  • Hashing
  • Checksums
  • Provenance

Preservation

  • Preservation Techniques

E-Discovery

  • E-Discovery Process

Data Recovery

  • Data Recovery Methods

Non-Repudiation

  • Ensuring Non-Repudiation

Strategic Intelligence/Counterintelligence

  • Strategic Intelligence Techniques
  • Counterintelligence Measures
Chapter 31 - Various Types of Controls

Category

  • Managerial
  • Operational
  • Technical

Control Type

  • Preventive
  • Detective
  • Corrective
  • Deterrent
  • Compensating
  • Physical
Chapter 32 - Applicable Regulations, Standards, or Frameworks

Regulations, Standards, and Legislation

  • General Data Protection Regulation (GDPR)
  • National, Territory, or State Laws
  • Payment Card Industry Data Security Standard (PCI DSS)

Key Frameworks

  • Center for Internet Security (CIS)
  • National Institute of Standards and Technology (NIST) Risk Management Framework (RMF)/ Cybersecurity Framework (CSF)
  • International Organization for Standardization (ISO) 27001/27002/27701/31000
  • SSAE SOC 2 Type I/II
  • Cloud Security Alliance
  • Cloud Control Matrix
  • Reference Architecture

Benchmarks/Secure Configuration Guides

  • Platform/Vendor-Specific Guides
  • Web Server
  • Operating System (OS)
  • Application Server
  • Network Infrastructure Devices
Chapter 33 - Importance of Policies to Organizational Security

Personnel

  • Acceptable Use Policy
  • Job Rotation
  • Mandatory Vacation
  • Separation of Duties
  • Least Privilege
  • Clean Desk Space
  • Background Checks
  • Non-Disclosure Agreement (NDA)
  • Social Media Analysis
  • Onboarding
  • Offboarding
  • User Training
  • Gamification
  • Capture the Flag
  • Phishing Campaigns
  • Phishing Simulations
  • Computer-Based Training (CBT)
  • Role-Based Training

Diversity of Training Techniques

  • Importance of Diverse Training Techniques
  • Examples and Implementation

Third-Party Risk Management

  • Vendors
  • Supply Chain
  • Business Partners
  • Service Level Agreement (SLA)
  • Memorandum of Understanding (MOU)
  • Measurement Systems Analysis (MSA)
  • Business Partnership Agreement (BPA)
  • End of Life (EOL)
  • End of Service Life (EOSL)
  • Non-Disclosure Agreement (NDA)

Data

  • Classification
  • Governance
  • Retention

Credential Policies

  • Personnel
  • Third-party
  • Devices
  • Service Accounts
  • Administrator/Root Accounts

Organizational Policies

  • Change Management
  • Change Control
  • Asset Management
Chapter 34 - Risk Management Processes and Concepts

Risk Types

  • External
  • Internal
  • Legacy Systems
  • Multiparty
  • IP Theft
  • Software Compliance/Licensing

Risk Management Strategies

  • Acceptance
  • Avoidance
  • Transference
  • Cybersecurity Insurance
  • Mitigation

Risk Analysis

  • Risk Register
  • Risk Matrix/Heat Map
  • Risk Control Assessment
  • Risk Control Self-Assessment
  • Risk Awareness
  • Inherent Risk
  • Residual Risk
  • Control Risk
  • Risk Appetite
  • Regulations that Affect Risk Posture

Risk Analysis

  • Risk Assessment Types
  • Qualitative
  • Quantitative
  • Likelihood of Occurrence
  • Impact
  • Asset Value
  • Single-Loss Expectancy (SLE)
  • Annualized Loss Expectancy (ALE)
  • Annualized Rate of Occurrence (ARO)

Disasters

  • Environmental
  • Person-Made
  • Internal vs. External

Business Impact Analysis

  • Recovery Time Objective (RTO)
  • Recovery Point Objective (RPO)
  • Mean Time to Repair (MTTR)
  • Mean Time Between Failures (MTBF)
  • Functional Recovery Plans
  • Single Point of Failure
  • Disaster Recovery Plan (DRP)
  • Mission Essential Functions
  • Identification of Critical Systems
  • Site Risk Assessment

Privacy Enhancing Technologies

  • Data Minimization
  • Data Masking
  • Tokenization
  • Anonymization
  • Pseudo-Anonymization

Roles and Responsibilities

  • Data Owners
  • Data Controller
  • Data Processor
  • Data Custodian/Steward
  • Data Protection Officer (DPO)

Information Life Cycle

  • Overview of Information Life Cycle

Impact Assessment

  • Conducting an Impact Assessment

Terms of Agreement

  • Understanding Terms of Agreement

Privacy Notice

  • Creating and Implementing Privacy Notices
What is the CompTIA Security+ (SY0-601) certification?

The CompTIA Security+ (SY0-601) certification is a globally recognized credential that validates the foundational skills needed to perform core security functions and pursue a career in IT security.

Who should take the CompTIA Security+ (SY0-601) course?

The course is ideal for aspiring cybersecurity professionals, network administrators, IT auditors, security consultants, and anyone looking to strengthen their knowledge in IT security.

What topics are covered in the CompTIA Security+ (SY0-601) course?

Topics include threat analysis, incident response, network security, cryptography, risk management, and compliance with industry regulations.

Do I need any prerequisites to enroll in the Security+ (SY0-601) course?

While there are no mandatory prerequisites, it is recommended that participants have basic knowledge of computer networks and security concepts. Experience with CompTIA Network+ is beneficial.

How is the course delivered?

The course is delivered through a blend of live instructor-led sessions, hands-on labs, and self-paced study materials. This hybrid approach ensures comprehensive learning and practical experience.

What type of projects will I work on during the course?

Participants will engage in real-world cybersecurity projects, including vulnerability assessments, penetration testing, incident response simulations, and the implementation of security protocols.

Will I receive a certificate upon completion of the course?

Yes, participants will receive a certificate of completion from Elysium Academy. Additionally, successful completion of the course prepares you for the CompTIA Security+ certification exam.

How long is the course, and how much time should I dedicate weekly?

The course duration is typically 8-12 weeks. It is recommended to dedicate around 10-15 hours per week to coursework, including lectures, labs, and self-study.

Is there support available after I complete the course?

Yes, our instructors and support team are available to provide guidance and answer any questions you may have even after the course has ended. Additionally, we offer resources for exam preparation.

How does the CompTIA Security+ (SY0-601) certification benefit my career?

The certification enhances your credibility and demonstrates your expertise in cybersecurity. It opens up various job opportunities, increases earning potential, and is often required by employers for cybersecurity roles.

Microsoft – Azure Fundamentals(AZ-900) Training Course
  • Microsoft – Azure Fundamentals(AZ-900) Course Crash
  • Duration:  45 Hours
  • Level:  Beginner
  • Days:  45 Days
  • Chapters:  11
  • Language:  English
  • Certifications:  Yes
  • Code:   EAPL/CRASH/CRTC25
  • Course Code:   EACAF
  • Sub Category:   Networking & Security Training Course

Job Roles

  • Cloud Administrator
  • Cloud Architect
  • Cloud Developer
  • Cloud Engineer
  • Cloud Consultant
  • Solutions Architect
shape-12
shape-06
Hero Shape 7
Get In Touch

info@elysiumacademy.org

or

Call Us Via

+91 96777 81155

Hero-Shape-1
shape-61
shape-60
shape-59
POPULAR COURSES

Pick A Course To Get Started

Download Syllabus
best full stack developer course
FAQ’S

FAQ in Azure Training Institute

What computer courses are available near me?

We offer courses in computer basics, MS Office, digital marketing, programming languages, and more.

Are the courses suitable for beginners?

Yes, we provide beginner-friendly courses for individuals just starting their computer journey.

What is the duration of computer training courses?

Our courses range from 1 to 6 months, depending on the subject and your pace.

Do you provide certificates?

Yes, we offer certificates upon successful completion of our computer courses.

Is placement assistance provided?

Yes, we offer placement assistance to help you land a job with top companies in the tech industry.


Career Support 24/7


4.8/5 Rating


100+ Hiring Partners

Core Features

  • Industry-Recognized Certifications
  • Hands-On Learning with Real Projects
  • Expert Trainers and Mentorship
  • Elysium Academy is One of the Members of NAASCOM
  • Comprehensive Course Catalog
Hero-Shape-3
shape-10
Hero-Shape-18
Hero-Shape-1

Obtain Your Accredited Skills Certification With Elysium Academy

Get started now
Logo (2)

Elysium Academy provides students with highly effective coaching classes, delivered through immersive classroom sessions and the best teaching methodologies designed to yield valuable results. We take great pride in our identity and are honored to be a part of your business journey.

Icon-facebook Icon-linkedin2 Icon-instagram Pinterest X-twitter Icon-youtube

Company

  • About Us
  • Mission & Vission
  • Blog
  • Reviews
  • Environment Policy
  • Payment Method
  • Our Awards
  • Franchise Oppurtunity
  • Ask Elsa

Student Zone

  • Become an instructor
  • Video Reviews
  • Placed Students
  • Interview Questions
  • Appointment Booking
  • Career Guidance
  • Placement Training
  • Download
  • Help Center
Logo (2)

Elysium Academy provides students with highly effective coaching classes, delivered through immersive classroom sessions and the best teaching methodologies designed to yield valuable results. We take great pride in our identity and are honored to be a part of your business journey.

Icon-facebook Icon-linkedin2 Icon-instagram Pinterest X-twitter Icon-youtube

Company

  • About Us
  • Mission & Vission
  • Blog
  • Reviews
  • Environment Policy
  • Payment Method
  • Our Awards
  • Franchise Oppurtunity
  • Ask Elsa

Student Zone

  • Become an instructor
  • Video Reviews
  • Placed Students
  • Interview Questions
  • Appointment Booking
  • Career Guidance
  • Placement Training
  • Download
  • Help Center

Our Branch Locations

  • Elysium Academy - Madurai , Anna Nagar
  • Chennai, CIT Nagar
  • Tirunelveli, Xavier Colony
  • Perambalur, Near New Bus Stand
  • Trichy,Thillainagar
  • Virudhunagar, Anna Nagar
  • Theni , NRT Nagar
  • Coimbatore - Hopes
  • Hosur
  • Tiruppur

Copyright © Elysium Academy | A Part of Elysium Groups

  • Cookie Policy
  • Terms & Condition
  • Terms of Use
  • Privacy Policy
Logo (2)