CYBER SECURITYMaster’s Program

Table of ContentsAbout the Course3Key Features4About Simplilearn4Program Outcomes5Who Should Enroll6Learning Path Visualization7CoursesStep 1 - Introduction to Cyber Security8Step 2 - CompTIA Security (SY0-601)9Step 3 - CEH (v11)- Certified Ethical Hacker11Step 4 - CISSP Training14Step 5 - Certified Cloud Security Professional16Electives18Certifications 19Classroom-Level Immersion Delivered Digitally20Customer Reviews21Corporate Training22

About the CourseThe Cyber Security Master’s Program will equip you with the full range of skillsneeded to become an expert in this rapidly growing domain. You will learncomprehensive approaches to protecting your infrastructure, including securingdata and information, running risk analysis and mitigation, architecting cloudbased security, achieving compliance and much more with this best-in-classprogram.3

Key Features96 hours of instructorled online classesExam Voucher includedfor CEH64 hours of e-learningcontentMaster’s Certificateupon coursecompletionAbout SimplilearnSimplilearn is the world’s #1 online bootcamp provider that enableslearners through rigorous and highly specialized training. We focuson emerging technologies and processes that are transformingthe digital world, at a fraction of the cost and time as traditionalapproaches. Over one million professionals and 2000 corporatetraining organizations have harnessed our award-winning programsto achieve their career and business goals.4

Program OutcomesInstall, configure and deploy public key infrastructure and network componentswhile assessing and troubleshooting issues to support organizational securityMaster advanced hacking concepts to manage information security efficientlyDesign security architecture and framework for a secure IT operationFrame cloud data storage architectures and security strategies, and utilize them toanalyze risksProtect data movement, perform disaster recovery, access CSP security andmanage client databasesImplement technical strategies, tools, and techniques to secure data andinformation for your organizationAdhere to ethical security behaviour for risk analysis and mitigationUnderstand security in cloud computing architecture in depthComprehend legal requirements, privacy issues and audit process methodologieswithin the cloud environmentFocus on IT compliance and the integrity of enterprise systems to establish a moresecure enterprise IT framework5

Program Eligibility Criteria andPrerequisitesThere are no prerequisites for this training program. Prior knowledge of anyprogramming language is recommended but not mandatory.Who Should Enroll in this Program?This program caters to working professionals from a variety of industries andbackgrounds; the diversity of our students adds richness to class discussions andinteractions.The following are the few professional profiles that are ideal students for this course:All levels of IT auditor/penetration testerSecurity consultants/managersIT directors/managers/consultantsSecurity auditors/architectsSecurity systems engineersChief information security officers (CISOs)Chief compliance/privacy/risk officersNetwork specialists, analysts, managers, architects, consultants or administratorsTechnical support engineersSystems analysts or administrators6

Learning Path1Introduction to Cyber Security2 hrs2CompTIA Security (SY0-601)36 hrs3CEH (v11)- Certified Ethical Hacker40 hrs4CISSP Training40 hrs5Certified Cloud Security Professional36 hrs6Masters CertificateYou will get individualcertificates for eachElectivesCompTIA Network CISM7

STEP12345Introduction to Cyber SecuritySimplilearn’s Introduction to Cyber Security course for beginners is designed to giveyou a foundational look at today’s cybersecurity landscape and provide you with thetools to evaluate and manage security protocols in information processing systems.Key Learning ObjectivesGain a comprehensive overview of cyber security principlesand conceptsLearn the challenges of designing a security programDevelop and manage an information security program, performbusiness impact analysis, and carry out disaster recoverytestingCourse CurriculumLesson 1 - Course IntroductionLesson 2 - Cyber Security FundamentalsLesson 3 - Enterprise Architecture and ComponentsLesson 4 - Information System Governance and Risk AssessmentLesson 5 - Incident Management8

STEP12345CompTIA Security (SY0-601)The CompTIA Security course will enable learners to gain knowledge and skillsrequired to install and configure systems to secure applications, networks, and devices;perform threat analysis and respond with appropriate mitigation techniques; participatein risk mitigation activities; operate with an awareness of applicable policies, laws, andregulations. Upon successfully validating their skills by passing the certification examlearners will be able to perform these tasks to support the principles of confidentiality,integrity, and availability. CompTIA Security meets the ISO 17024 standard and isapproved by the U.S.Key Learning ObjectivesComprehend risk identification and mitigationProvide operational, information, application and infrastructure level securitySecure the network to maintain the availability, integrity and confidentiality of criticalinformationOperate within a set of rules, policies and regulations wherever applicableCourse CurriculumLesson 1 - Lesson 01 - Learn about networking, firewalls, LAN security, IDS,NAC, IPSecLesson 02 - Understand the principles of security, risk management, dataclassification, disaster recovery, and forensicsLesson 03 - Comprehend cyber attacks, DNS security, social engineeringfundamentals, buffer overflows, security testing tools usage, honeypots,vulnerability and pen testing9

Lesson 04 - Learn how to handle bugs, secure storage platforms and the powergrid, how to hack IOTLesson 05 - Get familiar with access controls, Kerberos, identity federation, and idgovernanceLesson 06 - Encryption, advanced cryptography, crypto algorithm, PKI, etc arecovered in this lesson10

STEP12345CEH (v11)- Certified Ethical HackerThe Simplilearn’s CEH v11 Certified Ethical Hacker training (earlier CEH v10) andcertification course provide hands-on classroom training to help you master the sametechniques that hackers use to penetrate network systems and leverage them ethically toprotect your own infrastructure. The extensive course focuses on 20 of the most popularsecurity domains to provide a practical approach to essential security systems.Key Learning ObjectivesAfter completing this course you will be able to:Ace the CEH practical examLearn to assess computer system security by using penetrationtesting techniquesScan, test and hack secure systems and applications, and gainhands-on experience with sniffing, phishing and exploitationtacticsCourse CurriculumModule 01: Introduction to Ethical Hacking - Overview of information security,threats, attack vectors, ethical hacking concepts, information security controls,penetration testing concepts, and information security laws and standards arecovered in this moduleModule 02: Footprinting and Reconnaissance - These modules coverconcepts and types of footprinting, footprinting through search engines, webservices, and social networking sites, footprinting tools, countermeasures, andfootprinting pen testing11

Module 03: Scanning Networks - Learn about network scanning concepts,tools and techniques, network diagrams, and scanning pen testingModule 04: Enumeration - Enumeration concepts, types, techniques, andpen testing are covered in this moduleModule 05: Vulnerability Analysis - Overview of vulnerability assessmentconcepts, solutions, scoring systems, tools, and reports are explained inthis moduleModule 06: System Hacking - Learn how to crack passwords, hide files,cover tracks, any many moreModule 07: Malware Threats - This module gets you familiar with malwareconcepts, trojan concepts, malware analysis, countermeasures, malwarepenetration testingModule 08: Sniffing - Sniffing concepts, tools, and techniques areexplained in this moduleModule 09: Social Engineering - Comprehend social engineering concepts,techniques, countermeasures, and pen testingModule 10: Denial-of-service - Dos/DDoS concepts, techniques, tools, casestudies, and penetration testing are covered in this moduleModule 11: Session Hijacking - Know what is session hijacking and its types,tools, countermeasures, and session hijacking penetration testingModule 12: Evading IDS, Firewalls, and Honeypots - Learn about firewallsand honeypots and how to detect and evade themModule 13: Hacking Web Servers - This module focuses on web serverconcepts, attacks, methodologies, tools, countermeasures, and penetrationtesting12

Module 14: Hacking Web Applications - Web app concepts, tools,methodologies, countermeasures, and penetration testing are covered in thismoduleModule 15: SQL Injection - Get familiar with SQL Injection concepts, types,tools, methodologies, countermeasures, and penetration testingModule 16: Hacking Wireless Networks - Wireless concepts, threats,methodologies are covered in this moduleModule 17: Hacking Mobile Platforms - Learn how to hack android IOS, Mobilespyware, device management, security tools, and many more in this moduleModule 18: IoT Hacking - This module covers IoT Hacking concepts, attacks,methodologies, tools, countermeasures, and penetration testingModule 19: Cloud Computing - Concepts, attacks, methodologies, tools,countermeasures, and penetration testing of cloud computing are covered inthis moduleModule 20: Cryptography - This module will teach you about cryptographyconcepts, encryption algorithms, tools, PKI, types of encryption, cryptanalysis,and countermeasures13

STEP12345CISSP TrainingSimplilearn’s CISSP certification training is aligned with the (ISC)2 CBK 2018 requirements.The course trains you in the industry’s latest best practices, which will help you pass theexam in the first attempt. The certification helps you develop expertise in defining thearchitecture and in designing, building, and maintaining a secure business environmentfor your organization using globally approved Information Security standards.Key Learning ObjectivesBe able to define the architecture, design and management of the security of yourorganization.Acquire the relevant knowledge and skills required to pass the CISSP certificationexam.Earn the requisite 30 CPEs required to take up the CISSP certification exam.Develop working knowledge in the 8 domains prescribed by the CISSP CommonBook of Knowledge, 2018.Course CurriculumLesson 00: Introduction to CISSP - Overview of CISSP, CISSP Exams, ISC2 iscovered in this lessonLesson 01: Security and Risk Management - Information security management,risk analysis, legal systems, IP laws, BCA, CIA, etc are covered in this lessonLesson 02: Asset Security - Learn how to classify information, protect privacy,maintain ownership, establish handling requirements14

Lesson 03: Security Engineering - Understand security engineering processes usingsecure design principles, Architecture Frameworks, Security Models EvaluationCriteria, Distributed Systems, and many moreLesson 04: Communications and Network Security - Learn how to secure networkarchitecture, design, components, and communication channelsLesson 05: Identity and Access Management - Implement and manage authorizationmechanisms to prevent or mitigate access control attacksLesson 06: Security Assessment and Testing - Learn how to design and validateassessment and test strategiesLesson 07: Security Operations - Understand and support requirements forinvestigations by implementing resource protection techniques and incident responseLesson 08: Software Development Security - Comprehend the system life cycle andsystem development in this lesson15

STEP12345Certified Cloud Security ProfessionalSimplilearn’s online CCSP training course will help you gain expertise in cloud securityarchitecture, design, applications, and operations. CCSP by ISC2 is a globallyacknowledged certification which represents the highest standard for Cloud security.This course provides step by step guidance and easy-to-follow detailed explanation onevery facet of CCSP.Key Learning ObjectivesAfter completing this phase, you will be able to:Gain a firm foothold on Cloud computing and relevant security conceptsComprehend design principles of secure Cloud computingKnow about Cloud data lifecycleDesign Cloud data storage architectures and security strategies, and implement themeffectivelyApply data discovery and classification technologiesCreate and execute relevant jurisdictional data protection for personally identifiableinformationPlan and implement data retention deletion archival policies16

Learn about Cloud infrastructure components and analyze risks associated with itRecognize the need for training and awareness in application securityUnderstand Software Development Lifecycle (SDLC) process and apply itFrame appropriate Identity and Access Management (IAM) solutionsBuild and run logical and physical architectures for CloudAcquire an understanding of legal requirements, privacy issues, and audit processmethodologies within the Cloud environmentCourse CurriculumDomain 01: Architectural concepts and design requirements - Understandcloud computing concepts, cloud reference architecture, design principles ofsecure cloud computingDomain 02: Cloud Data Security - Comprehend and apply Cloud DataLifecycle, data security strategies, data discovery and classificationtechnologies, data rights management, and many moreDomain 03: Cloud Platform and Infrastructure Security - Analyze risksassociated to cloud infrastructure, design and plan security controls anddisaster recoveryDomain 04: Cloud Application Security - Learn about Software DevelopmentLife-cycle(SDLC) process, specifics of cloud application architecture, and manymore in this domainDomain 05: Operations - Build, implement, and manage physical infrastructurefor Cloud environmentDomain 06: Legal and Compliance - Understand legal requirements, privacyissues, audit process, cloud contract design17

Elective CourseCompTIA Network CompTIA Network is an ISO-17024 compliant, vendorneutral technology certification that verifies the skillsand knowledge of a certified individual to take ona pivotal role in building, managing, and protectingthe critical asset i.e. the data network. The CompTIANetwork course from Simplilearn covers the objectivesof the Network exam N10-006 and focuses mainly onthe IT skills mostly used by the IT professionals. It alsocovers topics on troubleshooting, security knowledge,and security controls.CISM18

CertificateC E R T I F I C AT EO F AC H I E V E M E N TCYBER SECURITYT H I S I S T O C E R T I F Y T H ATJOHN DOEHas successfully graduated from the Course Name MastersProgram summa cum laude having completed all mandatedcourserequirements and industry projects with distinction.Date: / /2021Krishna Kumar, CEOUpon completion of this Master’s Program, you will receive the certificates fromSimplilearn in the Cyber Security courses in the learning path. These certificates willtestify to your skills as an expert in Cyber Security. Upon program completion, you willalso receive an industry-recognized Master’s Certificate from Simplilearn.19

Classroom-Level Immersion:Delivered ive,InteractiveClassesHands-OnExperienceOnline Enrollment andAccess on Web and MobileLearner Watchesthe VideoChapter-EndQuizzesLive VirtualClassroomLive Interactionand lilearn Certification Criteria85%CourseCompletion 80%Score onSimulation Exam Internal, andExternalCertificationProject Submittedand AcceptedFinal Exam andCertification20

Customer ReviewsWalter AndersonThe instructor Bipin provided excellent CEHv10 onlineclassroom training using practical exercises and EC-Councilcontent, as well as sharing his priceless personal knowledgeand wisdom.21

Corporate TrainingTop clients we work with:Features of Corporate Training:Tailored learning solutionsFlexible pricing optionsEnterprise-grade learning management system (LMS)Enterprise dashboards for individuals and teams24X7 learner assistance and support22

INDIASimplilearn Solutions Pvt Ltd.# 53/1 C, Manoj Arcade, 24th Main,Harlkunte2nd Sector, HSR LayoutBangalore - 560102Call us at: 1800-212-7688USASimplilearn Americas, Inc.201 Spear Street, Suite 1100,San Francisco, CA 94105United StatesPhone No: SL-LP-3-127-202106

Master advanced hacking concepts to manage information security efficiently Design security architecture and framework for a secure IT operation Frame cloud data storage architectures and security strategies, and utilize them to analyze risks Protect data movement, perform disaster recovery, access CSP security and manage client databases