Practical Training Course on Certified In Risk and Information Systems Control (CRISC)

Practical Training Course on Certified In Risk and Information Systems Control (CRISC)

Practical Course for Information Security Analyst

Sr. No.

Topic

Sub-Topic

Duration

1

Understanding Security Attacks

How to Build a Lab for Security Tasks


Installing and Configuring Client and Server VMs
Information Security Overview
Security Threats and Attack Vectors
Attack Types and Concepts

2 Hrs.

2

Information Security

Introduction Infosec / IT security


Role of Security Analyst
Challenges in the field of Info security
Latest Threats & Exploits
Information Security Controls

2 Hrs.

3

Network Security

Introduction to Security Devices


Introduction to Security Devices
Network Port and Services Scanning
NMIS Open Source Tool
Understanding Defense in Depth

2 Hrs.

4

System Security

OS Hardening


Patch and Update Management
Security Policy Management
Antivirus and Firewall

2 Hrs.

5

Vulnerability Analysis

Incorporating Vulnerability Scans


Analyzing Vulnerability Scans
Remediating Host Vulnerabilities
Remediating Network Vulnerabilities
Remediating Virtual Environment Vulnerabilities

2 Hrs.

6

Phases of Hacking

Phase 1: Information Gathering


Phase 2: Scanning
Phase 3: Attack
Phase 4: Backdoor
Phase 5: Clearing Logs and Evidence

3 Hrs.

7

Malware

Introduction to Malware


Types of Malwares
Virus, Worms, Trojan and Ransomware
Detecting Malware

2 Hrs.

8

IT Security Config Standard

Security Configuration ( UNIX and Windows)


Asset Management
Patch Management
Reports & Action Plan

2 Hrs.

9

Social Engineering

What is Social Engineering?


Phishing and Spear Phishing Attacks
Identity Theft and Sensitive Data Stealing

2 Hrs.

10

SIEM–Logging and Monitoring

Security Incident & Event Management


Incidence Response Plan

2 Hrs.

11

Encryption and Cryptography

Data Integrity & Authentication


Encryption and Encryption Key Management
PKI & Digital Signatures
Certification

3 Hrs.

12

LOT Security

Implementation


Integration
Operations
Maintenance

2 Hrs.

13

SDLC & Web Applications

SDLC Process


OWASP Top 10
Discovering Risks in Web Servers
Managing and Hardening Web Servers
Discovering Risks in Web Servers
Managing and Hardening Web Servers

2 Hrs.

14

Cloud Security

Cloud Computing Concepts


Organizational Security Considerations
Cloud Computing Risks

2 Hrs.

15

Database Assessment

Why SQL Injection Matters?


Automating Attacks

2 Hrs.

16

Wireless Security

Encryption in Wireless


Threats from Wireless
Attacking Bluetooth

2 Hrs.

17

Attacking Mobiles

Hack Android & iOS Mobiles


Mobile Control via Malware
Mobile Apps Hacking

2 Hrs.

18

Prevention and Countermeasures

Monitor


Prevention & Countermeasures
Multilayer Security
Patch and Vulnerability Management

2 Hrs.

19

ISO 27001 Security Compliance and
PCI DSS Compliance Audit

ISO 27000 (Structure)


ISO 27001 (ISMS)
ISO 27002 (Security Management Controls)
PCI Compliance

2 Hrs.

Course Method

Interactive Instructor led online course( Zoom– Interactive Instructor Led Course)

Who Can Attend the Course

MS Students ( Final Year)

BS Students ( Final Year)

Associate Degree ( Final year)

Any Non-IT or Non-System professional

Any IT or Systems Professional

Network and Security professionals

IT System Professional

Programmers

IT Managers

Directors

VPs

Sales team

Course Duration Details

Course Duration: 40 Hrs.

Mentoring Session: 10 Hrs.

Total Training Hours ( Approx): 50 Hrs.

Get A Free Registration!