skills[at]csc[dot]gov[dot]in
1800 121 3468

Acquire basic skills in Cybersecurity

CSC Academy brings online skill course on Cybersecurity with the industry experts. The programme offers basic skill training on Cybersecurity.

Cyber Security study programmes teach you how to protect computer operating systems, networks, and data from cyber-attacks. You will learn how to monitor systems and mitigate threats when they happen.

Cybersecurity is security as it is applied to information technology. This includes all technology that stores, manipulates, or moves data, such as computers, data networks, and all devices connected to or included in networks, such as routers and switches. All information technology devices and facilities need to be secured against intrusion, unauthorized use, and vandalism. Additionally, the users of information technology should be protected from theft of assets, extortion, identity theft, loss of privacy and confidentiality of personal information, malicious mischief, and damage to equipment, business process compromise, and the general activity of cybercriminals. The public should be protected against acts of cyberterrorism, such as the compromise or loss of the electric power grid

Cybersecurity is the protection of internet-connected systems such as hardware, software, and data from cyber-threats. The practice is used by individuals and enterprises to protect against unauthorized access to data centres and other computerized systems.

Course Fee

Rs. 1180/- INR

Certification:

After completion of the online course, CSC Academy and Ecole Supérieure Robert de Sorbon®️, University certificate will be awarded to participants followed by an online assessment.

Course Modules

Cyber Security?

  • Cyberspace
  • Cyber Security
  • Password
  • Common Passwords
  • Endpoint Security
  • Creating a Password
  • Table 1: Tips for Password Management
  • Calculations - Computation - Communication

  • Computing
  • Communication
  • Calculations
  • Essentials of Cyber Security Concept

  • Cyber Security and Information Security
  • Fundamentals of Information Assurance
  • Concept of CIA Triad
  • Functioning of Internet and Network Layers

  • Internet Protocol Address
  • Domain Name System
  • Actions on the Internet after Clicking a Link
  • Layered Architecture of Networks
  • Basic Threats and Vulnerabilities Part -I

  • Threats through Emails
  • Malicious Codes or Malware Threats
  • Threat Classification
  • Basic Threats and Vulnerabilities Part -II

  • Virus
  • Virus Grouping
  • Basic Threats and Vulnerabilities Part - III

  • Worms
  • Classification of Worms
  • Trojan
  • Table 2: How do you find out when your system is infected? Symptoms
  • Table 3: Defence against Computer Infection
  • Additional Threats and Vulnerabilities

  • Spyware
  • Types of Spyware
  • Botnets
  • Exploitation: Threats and Vulnerabilities

  • SQL Injections
  • Buffer Overflow
  • Cross Site Scripting
  • Table 2: How do you find out when your system is infected? Symptoms
  • Table 3: Defence against Computer Infection
  • New Trends in Cyber Threats and Attacks

  • Actors on the Scene
  • Possible Targets
  • Advanced Persistent Threat
  • Blended Threats
  • DoS (Denial of Service) Attack.
  • Ransomware.
  • Insider Threats and Attacks
  • Who is this course for?

  • The Cybersecurity course is designed for beginners.
  • Basic Mathematics Knowledge required.
  • School Kids, Engineers, Designers, and anyone looking to learn Artificial Intelligence, Machine Learning, Deep Learning & Programming
  • All those who want to enhance their skill set and find a potential business & job opportunity in the space of Cybersecurity, IT, Programming.
  • Learning Outcomes

    The course will give the fundamental knowledge and practical abilities in Cybersecurity, detect attack methodology and combat hackers from intrusion or other suspicious attempts at connection to gain unauthorized access to a computer and its resources. Protect data and respond to threats that occur over the Internet. A student who completes the Cyber Security and Assurance program will be able to: -

  • Follow a structured model in Security Systems Development Life Cycle (SDLC).
  • Detect attack methodology and combat hackers from intrusion or other suspicious attempts at connection to gain unauthorized access to a computer and its resources.
  • Protect data and respond to threats that occur over the Internet.
  • Plan, implement and audit operating systems' security in a networked, multi-platform and cross platform environment.
  • Provide contingency operations that include administrative planning process for incident response, disaster recovery, and business continuity planning within information security.
  • Opportunities in Industries

  • New Product Development

  • Research & Development

  • Sheet Metal Industry

  • Piping industry

  • Artificial Intelligence/ Machine Learning, Robotics.

  • Manufacturing

  • Industries in Automotive Sector

  • Electronics

  • Many others use Solid Edge software for doing Research & Development

  • Model-based design

  • Solid Edge has been recognized a leader in Assembly and Surfacing platform.

  • Robotics.

  • course for

    The Siemen’s Solid Edge course is designed for beginners.

    Basic Designing Knowledge required

    School Kids, Engineers, Designers, Hobbyists, and anyone looking to learn Artificial Intelligence, Machine Learning, Deep Learning & Programming

    All those who want to enhance their skill set and find a potential business & job opportunity in the space of CAD, Designing, Robotics, Manufacturing, Automobile Industry, Sheet Metal Industry, Piping industry & Artificial Intelligence/Machine Learning

    Solid Edge Courses Modules

    Sketching: - 2D sketch geometry defines the cross-sectional shape used to create a base solid body or the shape used to create a feature on an existing solid body. Sketches are drawn in 3D on either a planar face or a reference plane. You lock onto a planar face or reference plane to draw sketch geometry.

    Modeling: - Solid modeling (or modelling) is a consistent set of principles for mathematical and computer modeling of three-dimensional solids. Solid modeling is distinguished from related areas of geometric modeling and computer graphics by its emphasis on physical fidelity.

    Assembly: - A Software Assembly is a collection of multiple 'built' configuration items, some or all of which have their own development process and their own release identifiers. These complete items are incorporated together into an assembly.

    Drafting & Detailing: - Drafting & Detailing The act or process of producing a technical drawing, or draft. Drafting & Detailing The art of producing technical drawings.

    Sheet Metal: - Sheet Metal parts are manufactured from a single sheet of metal the part must maintain a uniform wall thickness. Sheet metal parts with a minimum of 0.9mm to 20mm in thickness can be manufactured. When designing parts for laser cutting one should not make holes smaller than the thickness of the material.

    Surface Design: - Surface modeling gives you the ability to build out a visual representation of an object's exterior and its contours. In other words, it's a surface. These objects can be mechanical components like an engine - or complex organic shapes like animals.

     

    Cyber Security Course Register Register