top of page
Image by Markus Spiske

CYBRE SECURITY

Security in cyberspace is about technologies, processes, and policies that help to prevent as well as reduce the negative impact of events such as cybercrimes and cyber terrorism in cyberspace.

This is your admissions description. It’s a great place to inform prospective students about how to join SHRI BALAJI INFOTECH. Be concise and straightforward, and add a photo or video for extra engagement!

Learn More

IT COURSE DETAILS

in Shri Balaji Infotech

INTRODUCTION

KLiC Cyber Security

Almost everyone around us type at the keyboard of computers or tablets and use their smart phones daily. Computing and communications technologies have become an integral part of our life and in the context of this technology-rich environment the term “cyberspace” often arises. Cybersecurity i.e., Security in cyberspace is about technologies, processes, and policies that help to prevent as well as reduce the negative impact of events such as cybercrimes and cyber terrorism in cyberspace. KLiC Cyber Security course is designed for the young aspirants who wants to shape their careers in IT Security field.

WHY TAKE ADMISSION?

In this course, you will gain an overview of the cybersecurity, various types of viruses and malware, how to protect our system from viruses, types of cyber-attacks, various tools used for cyber-attacks, how to secure system from cyber-attacks. After completing this course, you will get various Career Opportunities like:
• Security Consultant.
• Information Security Analyst.
• Ethical Hackers.
• Computer Forensics Analysts.
• Chief Information Security Officer.
• Penetration Tester.
• IT Security Consultant.
• Security Systems Administrator and so on…..

CERTIFICATIONS & IMPORTANT DATES

Certification:

  • MKCL provides certificate to the KLiC learner after his/her successful course completion.

Important Dates:

  • Batch Commencement: One batch in each calendar month (January to December)

  • Date(s) of Application and Fee Payment by Learner: 1st - 30th day of each calendar month

  • Date(s) of Learner Confirmation by ALC: 1st - 30th day of each calendar month

  • Course Start Date and Date of Issuing Learner Login: Date of admission confirmation

ACADEMIC APPROACH

The Academic Approach of the course focuses on the “work centric” education i.e. begin with work (and not from a book !), derive knowledge from work and apply that knowledge to make the work more wholesome, useful and delightful. The ultimate objective is to empower the Learner to engage in socially useful and productive work. It aims at leading the learner to his/her rewarding career as well as development of the society.<

Learning methodology

  • Learners are given an overview of the course and its connection to life and work.

  • Learners are then exposed to the specific tool(s) used in the course through the various real-life applications of the tool(s).

  • Learners are then acquainted with the careers and the hierarchy of roles they can perform at workplaces after attaining increasing levels of mastery over the tool(s).

  • Learners are then acquainted with the architecture of the tool or Tool Map so as to appreciate various parts of the tool, their functions and their inter-relations.

  • Learners are then exposed to simple application development methodology by using the tool at the beginner’s level

  • Learners then perform the differential skills related to the use of the tool to improve the given ready-made outputs.

  • Learners are then engaged in appreciation of real-life case studies developed by the experts.

  • Learners are then encouraged to proceed from appreciation to imitation of the experts.

  • After imitation experience, they are required to improve the expert’s outputs so that they proceed from mere imitation to emulation.

  • Finally, they develop the integral skills involving optimal methods and best practices to produce useful outputs right from scratch, publish them in their ePortfolio and thereby proceed from emulation to self-expression.

SYLLABUS

  • Overview of Computer Viruses

  • Downloading and Installing Good Antivirus Software

  • Rootkits

  • Botnets

  • Ransomware

  • Patch Management

  • Installing and configuring Open Source Firewall

  • Network Intrusion Detection and Prevention System

  • Network Load Balancers

  • VPN Configuration

  • Cyber Attacks

  • Using Network Packet Analyzers

  • Ethical Hacking

  • Using Kali Linux for exploring various Ethical Hacking Tools

DURATION

60 hours to be covered in 1 Month (4 Weeks).

FEES

Total Fee (Rupees): 2000

*(inclusive of Course fees, Examination fees and Certification fees)

bottom of page