This program is geared towards generating and enhancing awareness about cybersecurity challenges and the concepts of cybersecurity and cyber ethics among the stakeholders to help them become responsible cyber citizens and participate safely and securely in the rapidly evolving information-age society. This course is in line with the Skillanto to introduce an elementary course in cybersecurity across all India. Thus, the course aims to address information gaps among people with respect to cybersecurity and can be used as a course in cybersecurity across all India. The course content will contain live session as well as recorded videos, which are based on the syllabus designed by the experts. All the participants, who are enrolled for the course, can take the course online/offline. Also, they can download the video/text material for later use. After the completion of each lecture, the students can clarify their doubts with the instructor, who is available online. At the end of the course, the students have an option to undergo a mock test.
Course Pre-Requisites
A Bachelors degree in IT or computer science with knowledge in network security.
Key Features
Learning Path
- History of InternetChapter 1
- Cyber CrimeChapter 2
- Information SecurityChapter 3
- Computer Ethics and Security PoliciesChapter 4
- Guidelines to choose web browsersChapter 1
- Securing web browseChapter 2
- AntivirusChapter 3
- Email securityChapter 4
- Guidelines for setting up a Secure passwordChapter 1
- Two-steps authenticationChapter 2
- Password ManagerChapter 3
- Wi-Fi SecurityChapter 4
- Guidelines for social media securityChapter 1
- Tips and best practices for safer Social NetworkingChapter 2
- Basic Security for Windows Chapter 3
- User Account PasswordChapter 4
- Introduction to mobile phonesChapter 1
- Smartphone Security Chapter 2
- Android SecurityChapter 3
- IOS SecurityChapter 4
- Counter Cyber Security Initiatives in IndiaChapter 1
- Cyber Security ExerciseChapter 2
- Cyber Security Incident HandlingChapter 3
- Cyber Security AssuranceChapter 4
- Online Banking SecurityChapter 1
- Mobile Banking SecurityChapter 2
- Security of Debit and Credit CardChapter 3
- UPI SecurityChapter 4
- Security of Micro ATMsChapter 1
- e-wallet Security GuidelinesChapter 2
- Security Guidelines for Point of Sales(POS)Chapter 3
- Social EngineeringChapter 1
- Types of Social EngineeringChapter 2
- How Cyber Criminal WorksChapter 3
- How to prevent for being a victim of Cyber CrimeChapter 4
- Cyber Security Threat LandscapeChapter 1
- Emerging Cyber Security ThreatsChapter 2
- Cyber Security TechniquesChapter 3
- FirewallChapter 4
- IT ActChapter 1
- Hackers-Attacker-CountermeasuresChapter 2
- Web Application SecurityChapter 3
- Digital Infrastructure SecurityChapter 4
- Defensive ProgrammingChapter 5
- Recovering from Information LossChapter 1
- Destroying Sensitive InformationChapter 2
- CCleaner for WindowsChapter 3
Frequenty Asked Questions
No FAQs Found!