cyber academy

  • Cybersecurity has become a key area of job growth in the last few years, which has resulted from an influx of people opting for a Cybersecurity career. Even so, there are a number of people who are still having second thoughts as to whether they should jump into the unknown waters of Cybersecurity for their professional life.

    Below are the key factors, that have made Cybersecurity certification such a brilliant career choice for many in our opinion :

    – Cybersecurity – An Evergreen Industry

    – Travel the World With Cybersecurity

    – A Career that Serves the Greater Good

    – A Chance to Work with Secret Agencies

    – No Maths!

    – Unlimited Potential for Growth

    – Plenty of Opportunities

    – A Variety of Industries to Choose

    – A Job that Never Gets Boring

    – Fat Pay Cheques

  • CompTIA Security+ (SY0-701) :

    The CompTIA Security+ certification is a vendor-neutral credential. The CompTIA Security+ exam is an internationally recognized validation of foundation-level security skills and knowledge, and is used by organizations and security professionals around the globe.

    The CompTIA Security+ certification exam will verify the successful candidate has the knowledge and skills required to assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; monitor and secure hybrid environments, including cloud, mobile, and IoT; operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; identify, analyse, and respond to security events and incidents

    – Number of questions : Maximum of 90

    – Duration : 90 minutes

    – Test format : Multiple choice and performance-based

    – Passing score : 750 (on a scale of 100–900)

    CREST CPSA :

    The CPSA program is a trusted and respected Security Analyst training Program that any Information Security professional will need.

    – Number of questions : 120

    – Duration : 2 hours

    – Test format : Multiple Choice

    – Passing score : 60%

  • IT Concepts & Terminology

    Comprehend notational systems, illustrate the basics of computing and explain the value of data and troubleshooting.

    Infrastructure

    Know how to set up and install common peripheral devices to a laptop/PC or secure a basic wireless network.

    Applications & Software

    Manage applications software, understand the various components of an operating system and explain the purpose of methods of application architecture.

    Software Development

    Comprehend programming language categories, interpret logic, and understand the purpose of programming concepts.

    Database Fundamentals

    Able to explain database concepts, structures, and purpose, as well as understands methods used to interface.

    Security

    Understand confidentiality, integrity, and availability concerns of secure devices and best practice methods.

    Hardware

    Identifying, using, and connecting hardware components and devices

    Operating Systems

    Install and support Windows OS including command line & client support. Understand Mac OS, Linux and mobile OS

    Software Troubleshooting

    Troubleshoot PC and mobile device issues including application security support

    Networking

    Explain types of networks and connections including TCP/IP, WIFI and SOHO

    Hardware & Network Troubleshooting

    Troubleshoot device and network issues

    Security

    Identify and protect against security vulnerabilities for devices and their network connections

    Mobile Devices

    Install & configure laptops and other mobile devices

    Virtualization & Cloud Computing

    Compare & contrast cloud computing concepts &set up client-side virtualization

    Operational Procedures

    Follow best practices for safety, environmental impacts, and communication and professionalism

    Networking Concepts

    Explain the purpose of a variety of networking concepts and implement them appropriately

    Infrastructure

    Determine & explain the appropriate cabling, device and storage technologies

    Network Operations

    Use best practices to manage the network, determine policies & ensure business continuity

    Network Security

    Summarize physical security & common attacks while securing the wired and wireless network

    Troubleshooting Network Troubleshooting & Tools

    Explain the network troubleshooting methodology & appropriate tools to support connectivity & performance

    Threats, attacks & vulnerabilities

    Detect various types of compromise and have an understanding of penetration testing and vulnerability scanning concepts

    Technologies & tools

    Install, configure, and deploy network components while assessing and troubleshooting issues to support organizational security

    Architecture & design

    Implement secure network architecture concepts and systems design

    Networking identity & access management

    Install and configure identity and access services, as well as management controls

    Risk management

    Implement and summarize risk management best practices and the business impact

    Cryptography & PKI

    Install and configure wireless security settings and implement public key infrastructure

    Footprinting and Reconnaissance

    Process which is used for gathering possible information about a target computer system or network

    Scanning Networks

    Process that can be defined in many ways, it identifies the active hosts (Clients and servers) on a network and their activities to attack a network.

    Enumeration

    Process of extracting user names, machine names, network resources, shares and services from a system.

    Vulnerability Analysis

    Process of identifying, quantifying, and prioritizing the vulnerabilities in a system.

    System Hacking

    The compromise of computer systems and software to gain access to the target computer and steal or misuse their sensitive information.

    Malware Threats

    Computer programs designed to infiltrate and damage computers without the users consent.

    Sniffing

    Process of monitoring and capturing all the packets passing through a given network using sniffing tools.

    Social Engineering

    In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information.

    Denial-of-Service

    An interruption in an authorized user's access to a computer network, typically one caused with malicious intent.

    Session Hijacking

    An attack where a user session is taken over by an attacker. A session starts when you log into a service, for example your banking application, and ends when you log out.

    Evading IDS, Firewalls, and Honeypots

    An Intrusion Detection System (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station.

    Hacking Web Servers

    Hackers attack on the web server to steal credential information, passwords, and business information by using DoS (DDos) attacks, SYN flood, ping flood, port scan, sniffing attacks, and social engineering attacks.

    Hacking Web Applications

    Serious weaknesses or vulnerabilities allow criminals to gain direct and public access to databases in order to churn sensitive data.

    SQL Injection

    Code injection technique that might destroy database.

    Hacking Wireless Networks

    Defeating the security of a wireless local-area network.

    IoT Hacking

    IoT (Internet of Things) and embedded devices present a new challenge to ethical hackers hoping to understand the security vulnerabilities these devices contain.

Career opportunities.

  • Systems Administrator

  • Network Administrator

  • Security Administrator

  • Junior IT Auditor/ Penetration Tester

  • Cyber Security Specialist

  • Cyber Security Consultant

  • Cyber Security Engineer

  • Cyber Security Analyst

  • and many more…

start your Cyber Journey now!