Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

iScience

With iScience School, we are fortunate to be able to take a principled approach based on current research in education around the globe. We design for outcomes that lead to personal development and high levels of engagement program, growth and real-world impact. We’re built to remain current. We built on research and learning criteria that supports essential knowledge, future ready skills, and habits for success. In everything we do, we keep the four pillars of educational values in our mind.

Key Focus Area

Cyber Security
Overview

This course focuses on Cyber Security Basic Concepts like Common terms used, types of malicious files used, privacy issues faced in day-to-day life, cookies, Cryptography also focuses on practical demos on cryptography and practical examples to protect against Cyber Attacks

Module 1: Understanding Cybersecurity Fundamentals

1:1: Definition of Cyber Security

1.2: Importance of cybersecurity in the digital age

1.3: Consequences of cyber attacks

1.4: Cybersecurity Terminologies

1.4.1: Malware: viruses, worms, Trojans

1.4.2: Phishing: email, spear phishing, vishing

1.4.3: Hacking: types of hackers, ethical Hacking vs. malicious Hacking

1.5: Activity

1.5.1: Activity 1: Cybersecurity Term Matching Game

1.5.2: Activity 2: Debate on Hacking:     

1.5.3: Activity 3: Quiz  

 

Module 2: Basics of Information Security

2.1:  Information Security Principles

2.1.1: Confidentiality, integrity, availability (CIA triad)

2.1.2: Role of information security in protecting data

2.2: Security Controls

2.2.1: Access control mechanisms: passwords, biometrics

2.2.2: Encryption techniques: symmetric vs. asymmetric encryption, SSL/TLS

2.3: Activities

2.3.1: Activity 1: Online password testing game

2.3.2: Activity 2: Cipher Quest

2.3.3: Activity 3: Quiz

Module 3: Understanding Human Factors in Social Engineering

3.1: Understanding Curiosity: What Makes Us Curious?

3.2: Exploiting Curiosity in Social Engineering Attacks

3.3: Being Aware of Social Engineering Tactics

3.4: Tips for Staying Safe Online and Offline

3.5: What to Do If You Suspect Social Engineering

3.6: Activity: Quiz

 

Module 4: Understanding and mitigating cyber threats

4.1: Types of Malwares

4.1.1: Viruses: how they spread and infect systems

4.1.2: Worms: self-replicating Malware

4.1.3: Trojans: disguised as legitimate software

4.2: Social Engineering Attacks

4.2.1: Phishing: deceptive emails and websites

4.2.2: Spear phishing: targeted phishing attacks.

4.2.3: Social media scams: fake profiles, quizzes, and surveys

4.3: Activity: Quiz

 

Module 5: Internet Safety and Privacy

5.1. Safe internet browsing practices: avoiding suspicious websites

5.2. Software updates and patches: It is important to keep software up to date.

5.3. Data privacy: risks of sharing personal information online

5.4. Risks of oversharing on social media platforms: privacy settings, sharing limits

5.5. Activities

5.5.1. Space Shelter: a game about learning to stay safer online.

5.5.2. Activity: Quiz

 

Module 6: Securing Digital Devices

6.1: Device Security

6.1.1: Securing computers, smartphones, and tablets: antivirus software, firewalls

6.1.2: Importance of installing security updates and patches

6.2: Secure Communication

6.2.1: Email encryption: PGP, S/MIME

6.2.2: Virtual Private Networks (VPNs) for secure internet browsing

6.3: Activities

6.3.1: Activity 1: List various antivirus software on the market.

6.3.2: Prepare a presentation on firewalls and their types

6.3.3: Activity: Quiz

 

Module 7: Cybersecurity Best Practices

7.1: Creating Strong Passwords

7.1.1: Password complexity: length, combination of characters

7.1.2: Password management tools: password managers, two-factor authentication

7.2: Backup and Recovery

7.2.2: Importance of regular data backup: data loss prevention

7.2.3: Backup strategies: onsite vs. offsite backup, cloud backup services

7.3: Activities

7.3.1: List various antivirus software available in the market

7.3.2: Prepare a presentation on firewalls

7.3.3: Activity: Quiz

 

Module 8: Ethical and Legal Aspects of Cybersecurity

8.1: Ethics in Cybersecurity

8.1.1: Ethical Hacking: penetration testing, vulnerability assessments

8.1.2: Responsible disclosure of vulnerabilities: bug bounty programs

8.2: Cybersecurity Laws and Regulations

8.2.1: Overview of data protection laws in India

8.2.2: Cybercrime laws and penalties: consequences of cyber-attacks, legal consequences for hackers

8.3: Case studies

8.4: Activity – Quiz

0
    0
    Your Cart

    Enroll Now