-
Why Cybersecurity and Networking?
Cyber threats are evolving, and so must our defense. Our comprehensive course goes beyond the basics, immersing you in the strategic world of cybersecurity and the intricate web of networking. Become the architect of secure systems and a sentinel against digital threats.
This professional certificate course will provide candidates with how to apply the principles of cyber security and ethical hacking, Apply security tool kits, Vulnerability assessment, and Fundamentals of networking and system administration will be covered at the beginning of the program.
Enroll Today and Secure Your Future in Cybersecurity and Networking!
Seize the opportunity to become a digital guardian. Enroll now and let’s embark on a journey where you not only learn the art of cybersecurity and networking but also contribute to creating a safer, more connected world.
Course Details
In the realm of IT security, diverse roles collaborate to fortify organizations against cyber threats. From Network Security Engineers designing protective measures to Cloud Security Engineers specializing in safeguarding cloud environments, these professionals collectively ensure robust cybersecurity. Their responsibilities encompass everything from vulnerability assessments and incident response to network architecture, forming a resilient defense against evolving digital challenges.
Course Outline
1.0 Introduction of Cyber security
Introduction Cyberspace and Cyber security.
Fundamentals of Cyber Security.
2.0 Network and System Engineering
Basic Network concept.
Fundamentals of Windows and Linux operating system.
Windows batch scripting and system automation.
Linux Bash scripting and system automation.
Windows Power-shell automation
Installation Linux servers (Squid/ Apache2 /etc).
Installation Windows servers.
Fundamentals of virtualization and Cloud computing.
IT architecture.
3.0 Programming and cyber security
Basic python Programing with network programming.
4.0 Cyber security and Pentesting
Introduction to ethical hacking and phases.
Ethical Hacking and Basic Vulnerability assessment.
Cyber law.
Type of hacking and Hacking modalities.
Introduction and Penetration framework.
Intelligence gathering security tool kit Design.
Introduction Black Box OS.
Introduction Opensource offensive and defensive security tools.
Learning Outcomes
ILO1: Understating of the cyber security concept and Networking, basic programming, and Ethical hacking concept
ILO2: Apply cyber security concept to the real-world scenarios
ILO3: Identify vulnerabilities critical to the information assets of an organization
ILO4: Analyze and resolve security issues in networks and computer systems to secure an IT infrastructure
To Whom?
Individuals aspiring to be learning cyber security and Ethical hacking.
Students who have completed O/L or A/L examinations and waiting for the results.
Individuals who start work as Tech Support, IT assistant.
Method Of Delivery
Lab Demonstrations Face to Face
How To Apply?
For further details, please contact
IIT Professional Development Unit
0770 566 577 | pdu@iit.ac.lk
Address : 57, Ramakrishna Road, Colombo 06, Sri Lanka.
Phone : 766760760
Email : info@iit.ac.lk
Website : https://www.iit.ac.lk
Informatics Institute of Technology
Stream: Computer Science & IT
Level: Honours Bachelor Degree