Online Training Course Overview
This training at Evision helps candidate to acquire a fundamental understanding of various computer and network security threats such as malware, virus and backdoors, identity theft, phishing scams, hacking attacks, credit card fraud, and social engineering, and protect their information assets in the constantly changing security landscape.
Why should you take up this Star Cyber Secure User(SCSU) certification training?
• This Cyber Security certification course will open a number of Cyber Security job opportunities for you and help you climb up the career ladder. All skills and tools covered in this course will ensure that you gain the experience and expertise demanded of Cyber Security professionals in the job market today.
• Ethical Hacking having numerous career advancement opportunities, it helps to prepare you for different roles in cyber domain like computer network defense analyst, infrastructure support, infosec incident responder, infosec auditor, intrusion analyst, security manager, and other related high-profile roles.
• The demand for cyber security is rising exponentially both in Indian market as well as abroad with excellent potential in the IT market and is a very important aspect of any company. This course is not only for IT sector but also for professionals.
• According to NASSCOM, India requires 1,00,000 ethical hackers every year out of which the job market can only provide 30,000. The demand being way more than the supply Ethical Hacking is one of the most sought after and promising professions now.
• According to Cyber Seek, the United States faced a shortfall of almost 320,000 cyber security professionals as of January 2021. Same can be said for India as well.
Who should learn this Star Cyber Secure User(SCSU) certification training?
This course is specifically designed for today's Computer user, who uses the internet extensively to work, study and play.
Career Path
• Penetration Tester
• Information Security Analyst
• Information security Consultant
• Information System Security Engineer

Eligibility
BCA / MCA / BE / B.Tech / BCS / MCS / BBA / MBA
Skills Covered
Linux | Security and Risk Management | IoT Hacking | Cloud Computing | Cryptography| Footprinting and Reconnaissance | Vulnerability Analysis | System Hacking| Sniffing| Malware Threats | Social Engineering | Session Hijacking | Firewalls and Honeypots| Hacking Web Servers | RAID | Digital forensics
Objectives
In this SCSU course, candidate will learn the following concepts and more:
• How to secure yourself and your organization from cyber attacks
• How to spot vulnerabilities
• How to secure data and operating systems
• Best practices for Internet security
• How to secure your mobile devices from attacks
• How to secure your communication over network connections
Key Features

Prerequisites
• Some years of experience as a security professional in any one of the security domains, such as cryptography, access control, operations security, etc.
• A keen interest in making a career in the management-level Cyber Security and IT security
Course Schedule and Fees
Week Day batches
(Mon-Fri)
Monday
8:00 Am(IST)1hr - 1.30hr/ per person
Week Day batches
(Mon-Fri)
Monday
8:00 Am(IST)1hr - 1.30hr/ per person
Week Day batches
(Mon-Fri)
Monday
8:00 Am(IST)1hr - 1.30hr/ per person
Week End batches
(Mon-Fri)
Monday
8:00 Am(IST)1hr - 1.30hr/ per person

can't find a batch you were looking for?
Course Content
Module 1: Fundamentals • Network Basics - The OSI Model -TCP/IP Model -Encapsulation/Decapsulation -Connection Establishment and Connection Termination • Advanced Networking Concept, Network Packet Analysis -Understanding things in the packet layer -How to capture packets? Promiscuous mode, SPAN, Possssrt Mirroring and Hubbing out. -Wireshark – The packet analyzer, BSD Filter -Wireshark, Analyzing slow network, PCAP example. • Windows & Linux Basics -Introduction -Windows system architecture -Linux Basics and Commands Module 2: Network Security • Reconnaissance • Finding Vulnerabilities – Manual methods -Vulnerability Assessment (VA) -Penetration testing -Enumeration of services • Finding Vulnerabilities – Automated methods -Nessus Vulnerability scanner -Getting exploit code – Exploitation Framework (msf) -Attacking Linux and Windows • Network Security Auditing/ Wireless -Architecture Review -Wireless Security -WLAN Risk and Attack Taxonomy -Setting up the Aircrack-ng Kung-Fu, Cloaking Hidden SSID • Cracking WPA/WPA2 PSK, Evil Twin Module 3: Server Security • Database Security -Database Fundamentals -Database Management System -DBMS and RDBMS -Database Administrator, Database Security Issues, -Auditing in Database • Windows Security -Introduction to windows security architecture -Event Log -Windows General Security Practices -Windows Auditing • Linux server security -Boot Security, Patching Linux Kernel -The Linux Security Model - Users and Groups, Linux File Security, Index nodes -OS hardening& Exercises Module 4: Application Security • Introduction to Applications • OWASP Top 10 • Using Application Proxies- Burp-suite • WASC-Web Application Security Consortium • Risk Based Security Testing (Business Logic Testing) • Threat Modeling • Source Code Analysis Module 5: Mobile Security • Android Basics -Android Security Architecture -Connecting to Android Device -Reverse engineering Android Apps • Android Exploitation • OWASP Top 10 Vulnerabilities. • Introduction to iOS • iOS Security Architecture & Mechanisms • Jailbreaking • Connecting to device • Dynamic and Static AnalysisDownload Syllabus
EVISION Certification is Accredited by all top IT MNC's as in Wipro, TCS, IBM,Infosys,HCL Technologies. We provide Certification after completion of the theoretical and practical sessions to fresher’s as well as corporate trainees.
.jpeg)
Our certification at Evision Technoserve is accredited worldwide. It increases the value of your resume and you can attain leading job posts with the help of this certification in leading MNC’s of the world. The certification is only provided after successful completion of our training and practical based projects course which will encourage and add to trainee’s resume to explore a lot of opportunities beyond position.
• Updating Operating System Manually• Protecting USB Data Drives with Bitlocker
• Removing Malware with Windows Defender Antivirus
• Protecting Against Phishing Attacks
• Enabling router Encryption to Protect Wi-Fi
• Protecting Android OS from Security Threats
• Protecting iOS from Security Threats
• Scanning E-Mail Attachments for Malware
• Erasing apple iOS Devices Remotely
• Disabling Location Service on Twitter for Android
EVISION Trainer's Profile for Microsoft Star Cyber Secure User(SCSU) Training

XYZ Sr. Developer Wipro
About Trainer
XYZ is an AWS solutions architect and Database Expert. He has over 15+ years of experience working with investments banks across the globe. He has authored courses on AWS solutions architecture and Database migration.
EVISION'S Microsoft Star Cyber Secure User(SCSU) Trainers are:
• Truly expert and fully up-to-date in the subjects they teach because they continue to spend time working on real-world industry applications.
• Have recognized in various IT Organizations & Are Well connected with Hiring HRs in multinational companies.
• Working professionals working in MNC's such as HCL Technologies, TCS, IBM, etc.
• Certified Professionals with 10+ years of experience.