Course Overview

Course Curriculum

Course Content

  • IITM CS - Enterprise Infrastructure Security

    Preview
    • Lesson 01: Security Fundamentals

      • Fundamentals of Cybersecurity
      • Overview of Asset
      • Basics of Vulnerability
      • Understanding Threats
      • Basics of Attack
      • Understanding Risk
      • Risk Assessment
      • Important Terms in Risk Analysis
      • Types and Application of Security Controls
      • Risk Management Frameworks
      • Overview of GRC
    • Lesson 02: Network Security

      • Network Access Control
      • Firewall
      • Overview of Unified Threat Management (UTM)
      • Next-Generation Firewall (NGFW)
      • Web Application Firewall
      • Proxy Server
      • Intrusion Detection and Prevention Systems
      • IDS/IPS Placement
      • IDS and IPS Detection Methods
      • Honeypots
      • Virtual Private Network (VPN)
      • Types of VPNs
      • VPN Protocols
      • Security Information and Event Management (SIEM)
      • Overview of Secure Orchestration, Automation, and Response (SOAR)
      • Micro-Segmentation
      • Overview of Zero-Trust Network
    • Lesson 03: Fundamentals of SIEM

      • Introduction to Security Information and Event Management (SIEM)
      • History and Evolution of SIEM
      • Role of SIEM in Security Operations Centers (SOCs)
      • Key Benefits of Implementing SIEM
      • Overview of the Threat Landscape
      • Introduction to Leading SIEM Solutions
    • Lesson 04: Logs in Security Information and Event Management (SIEM)

      • Introduction to Logs, Their Types, and Sources
      • Event Types
      • Log Formats: Syslog, JSON, XML
      • Log Fields
      • Methods of Log Collection (Agents vs. Agentless)
      • Challenges in Log Collection and Storage
      • Log Collectors/Agents and Their Role in SIEM
    • Lesson 05: Log Management and SIEM Optimization

      • Data Storage and Indexing
      • Log Correlation Engine: Unifying Data for Enhanced Threat Detection
      • On-Premises SIEM vs Cloud-Based SIEM
      • Data Source Integration and Configuration
      • Log Normalization
    • Lesson 06: Advance concepts of SIEM

      • Parsing and Categorization
      • SIEM Use Case
      • SIEM Rules: Overview
      • Testing and Tuning Rules
      • SIEM Alerts
      • Incident Prioritization and Triage
      • SIEM in Incident Response
      • Incident Response Workflow
    • Lesson 07: Identity And Access Management

      • Authentication, Authorization, Accounting, and Auditing (AAAA)​
      • Multi-Factor Authentication (MFA)​
      • Bring Your Own Device (BYOD)​
      • Identity and Access Management (IAM) Lifecycle​
      • Single Sign-on (SSO)​
      • OAuth (Open Authorization)​
      • Kerberos
      • Active Directory (AD)​

Why Join this Program

  • Develop skills for real career growthCutting-edge curriculum designed in guidance with industry and academia to develop job-ready skills
  • Learn from experts active in their field, not out-of-touch trainersLeading practitioners who bring current best practices and case studies to sessions that fit into your work schedule.
  • Learn by working on real-world problemsCapstone projects involving real world data sets with virtual labs for hands-on learning
  • Structured guidance ensuring learning never stops24x7 Learning support from mentors and a community of like-minded peers to resolve any conceptual doubts
  • Acknowledgement
  • PMP, PMI, PMBOK, CAPM, PgMP, PfMP, ACP, PBA, RMP, SP, OPM3 and the PMI ATP seal are the registered marks of the Project Management Institute, Inc.