Become a
Cyber Security Expert

Build your capacity to investigate, mitigate and combat cybercrime for a rewarding and highly sought-after career as a cyber security professional.

Learning Online

Live Classes

Course Duration

2-3 Months

FREE Demo on

6 April, 2024 @ 7PM - 8:30PM

Why with PurpleLane?

Personal Mentoring

Get Industry expert guidance from Basics to advanced levels in the course with personalized answers, motivation, and continuous support to keeps you on track.

Flexible Learning Program

Personalized learning plan, flexible schedule, weekly programming challenges with solutions, and a supportive discussion forum for interactive learning.

Real-World Projects

Gain vital tech skills sought by top-tier companies through hands-on real-world projects, mastering command line applications end-to-end.

Why join this course?

Complete networking concepts from the scratch

Assignments & Lab practicals

Weekly tests & Feedback sessions

Resume Building

LinkedIn Profile Optimisation

Placement Assistance for 2 months after completing the course.

Daily live classes by industry experts

100+ hours of live classes

Access to video recordings and our LMS for 6 months

Mock Interviews



Tools you will master...

Experience The World-Class Curriculum...

In this Module you will Learn about Networking Concepts, Pillers of Security and Security Solutions

1.Networking Concepts

IP Classifications

Ports/Protocols

Network architecture

OSI Layers

Subnetting

Encoding

TCP 3 way

TCP/UDP

Encryption

NAT/PAT

Network Topology

Hashing

MAC/Switch/Router/HUB

Multi Casting/Uni Casting /Broad Casting

2.Pillars Of Security

CIA(Confidentiality, Intigrity, Availability)

IAAA(Identification, Authentication, Autherization, Accountability)

3.Security Solutions

Firewall

Antivirus

Hashing

Email Gateway

Proxy

WAF(Web Application Firewall)

EPO(End Point Protection)

DLP(Data Loss Prevention)

DNS(Domain Name System)

DMZ(Demilitarized Zone)

DHCP(Dynamic Host Configuration Protocol)

IDS/IPS (Intrusion detection systems & Intrusion prevention systems)

In this Module you will Learn about Social Engineering and Common Attacks

4.Social Engineering

Tailgating

Piggybacking

Shoulder surfacing

Dumpstar diving

Impersonating

5.Common Attacks

DOS/DDOS/SYN Flood

Bruteforce Attack

SQL Injection

Buffer Overload

XSS(Cross site scripting)

Phishing

XSRF(cross site request forgery)

Water Fall Attack

ARP Poisoning/MAC Flooding

Ping/ICMP Flood

Zero day Attack

OWASP 10

Cyber Kill Chain

Incident life Cycle

In this Module you will Learn about Malware & Type and SIEM

6.Malware & Type

Virus

Warm

Rootkit

Ransomware

Spy ware

Adware

Logic Bomb

Trojan

Windows & LINUX Commands

7.SIEM

Components of SIEM

Architecture of SIEM

USE Cases

Incident Investigation

Playbooks/SOP's

Trouble shooting

Log Source Integration

Governance Report

Windows logs,Event ID's,login Types

Dashboard/reporting

Risk/Threat/Vulnerability

SIEM Tools: ARC Sight,Qradar,Splunk

Successful completion of the programme may qualify you for various roles in cyber security, including...

Information Security Specialist

Information security specialists will monitors the network traffic for security Incidents and events.

Cyber Security Analyst

Cyber Security Analyst will Investigate Incidents and respond to events in Real time and they will

Cyber Threat Intelligence Analyst

Cyber Threat Intelligence Analyst will use their Expert Knowledge of malicious software to research

Cloud Security Analyst

Cloud Security Analyst will develop security plans and will analyze the data breaches by using cloud.

SOC Specialist

SOC Analyst will conduct security Assessments and will manage Network protocols and packet.

Information Security Specialist

Information security specialists will monitors the network traffic for security Incidents and events.

Cyber Security Analyst

Cyber Security Analyst will Investigate Incidents and respond to events in Real time and they will

Cyber Threat Intelligence Analyst

Cyber Threat Intelligence Analyst will use their Expert Knowledge of malicious software to research

Cloud Security Analyst

Cloud Security Analyst will develop security plans and will analyze the data breaches by using cloud.

SOC Specialist

SOC Analyst will conduct security Assessments and will manage Network protocols and packet.



Get Certified on completing the course!

  • Icon
    You become an PurpleLane Certified Professional to showcase your skills and boost your credibility in your portfolio. Certification gives creators greater visibility, credibility, and confidence
  • Icon
    Upskill, Add and Share this certificate with your Resume/ CV or on your LinkedIn Profile
See what candidates want, upfront

Who should take this course?

Learn the core concepts of cyber security and build a solid foundation using thein-demand market skills.You will benefit from this if you are..

A fresh graduate wanting to break into the cyber security domain

A professional looking to transition into a career in cyber security.

An IT infrastructure manager wanting to upskill with cyber security.

A mid to senior-level manager involved in cyber security governance and decision-making.

Get in Touch with us!

Fill out the details to avail a free counselling session with our experts within 24 hours.

www.purplelane.in

team@purplelane.in

783 783 4303