With iScience School, we are fortunate to be able to take a principled approach based on current research in education around the globe. We design for outcomes that lead to personal development and high levels of engagement program, growth and real-world impact. We’re built to remain current. We built on research and learning criteria that supports essential knowledge, future ready skills, and habits for success. In everything we do, we keep the four pillars of educational values in our mind.
This course focuses on Cyber Security Basic Concepts like Common terms used, types of malicious files used, privacy issues faced in day-to-day life, cookies, Cryptography also focuses on practical demos on cryptography and practical examples to protect against Cyber Attacks
Module 1: Understanding Cybersecurity Fundamentals |
1:1: Definition of Cyber Security |
1.2: Importance of cybersecurity in the digital age |
1.3: Consequences of cyber attacks |
1.4: Cybersecurity Terminologies |
1.4.1: Malware: viruses, worms, Trojans |
1.4.2: Phishing: email, spear phishing, vishing |
1.4.3: Hacking: types of hackers, ethical Hacking vs. malicious Hacking |
1.5: Activity |
1.5.1: Activity 1: Cybersecurity Term Matching Game |
1.5.2: Activity 2: Debate on Hacking: |
1.5.3: Activity 3: Quiz |
|
Module 2: Basics of Information Security |
2.1: Information Security Principles |
2.1.1: Confidentiality, integrity, availability (CIA triad) |
2.1.2: Role of information security in protecting data |
2.2: Security Controls |
2.2.1: Access control mechanisms: passwords, biometrics |
2.2.2: Encryption techniques: symmetric vs. asymmetric encryption, SSL/TLS |
2.3: Activities |
2.3.1: Activity 1: Online password testing game |
2.3.2: Activity 2: Cipher Quest |
2.3.3: Activity 3: Quiz |
Module 3: Understanding Human Factors in Social Engineering |
3.1: Understanding Curiosity: What Makes Us Curious? |
3.2: Exploiting Curiosity in Social Engineering Attacks |
3.3: Being Aware of Social Engineering Tactics |
3.4: Tips for Staying Safe Online and Offline |
3.5: What to Do If You Suspect Social Engineering |
3.6: Activity: Quiz |
|
Module 4: Understanding and mitigating cyber threats |
4.1: Types of Malwares |
4.1.1: Viruses: how they spread and infect systems |
4.1.2: Worms: self-replicating Malware |
4.1.3: Trojans: disguised as legitimate software |
4.2: Social Engineering Attacks |
4.2.1: Phishing: deceptive emails and websites |
4.2.2: Spear phishing: targeted phishing attacks. |
4.2.3: Social media scams: fake profiles, quizzes, and surveys |
4.3: Activity: Quiz |
|
Module 5: Internet Safety and Privacy |
5.1. Safe internet browsing practices: avoiding suspicious websites |
5.2. Software updates and patches: It is important to keep software up to date. |
5.3. Data privacy: risks of sharing personal information online |
5.4. Risks of oversharing on social media platforms: privacy settings, sharing limits |
5.5. Activities |
5.5.1. Space Shelter: a game about learning to stay safer online. |
5.5.2. Activity: Quiz |
|
Module 6: Securing Digital Devices |
6.1: Device Security |
6.1.1: Securing computers, smartphones, and tablets: antivirus software, firewalls |
6.1.2: Importance of installing security updates and patches |
6.2: Secure Communication |
6.2.1: Email encryption: PGP, S/MIME |
6.2.2: Virtual Private Networks (VPNs) for secure internet browsing |
6.3: Activities |
6.3.1: Activity 1: List various antivirus software on the market. |
6.3.2: Prepare a presentation on firewalls and their types |
6.3.3: Activity: Quiz |
|
Module 7: Cybersecurity Best Practices |
7.1: Creating Strong Passwords |
7.1.1: Password complexity: length, combination of characters |
7.1.2: Password management tools: password managers, two-factor authentication |
7.2: Backup and Recovery |
7.2.2: Importance of regular data backup: data loss prevention |
7.2.3: Backup strategies: onsite vs. offsite backup, cloud backup services |
7.3: Activities |
7.3.1: List various antivirus software available in the market |
7.3.2: Prepare a presentation on firewalls |
7.3.3: Activity: Quiz |
|
Module 8: Ethical and Legal Aspects of Cybersecurity |
8.1: Ethics in Cybersecurity |
8.1.1: Ethical Hacking: penetration testing, vulnerability assessments |
8.1.2: Responsible disclosure of vulnerabilities: bug bounty programs |
8.2: Cybersecurity Laws and Regulations |
8.2.1: Overview of data protection laws in India |
8.2.2: Cybercrime laws and penalties: consequences of cyber-attacks, legal consequences for hackers |
8.3: Case studies |
8.4: Activity – Quiz |
Address : #37/1977, Infra Futura Building,Opp Bharata
Mata College, Seaport Airport Road, Kakkanad,
Kochi, Kerala – 682021.
Phone : +91 6362234133