Cyber security has become the prime concern for every service organization these days. Organizations, unacquainted with the cyber-attacks and the harm it can cause to the systems are falling prey to these attacks. Cyber security consists of all the technologies and practices that keep computer systems and electronic data safe.
What is this course all about-
Introduction to the principles and techniques, which is associated with the cyber security practice known as penetration testing or ethical hacking. The course covers planning, reconnaissance, scanning, exploitation, post-exploitation, and result reporting. Student will discovers how system vulnerabilities can be exploited and learns to avoid such problems.
Why Cyber Security is so important-
International research and advisory firm Gartner Inc. predicts worldwide security spending will hit $96.3 billion in 2018, an 8% increase in just one year. These days, the need to shield information from malicious actors is a concern at the highest levels of business and government. Even small companies face threats if they don't keep their security strong. A recent survey from Nationwide Mutual Insurance Company in USA found that 58% of business owners with up to 299 employees had been victims of a cyber attack. Computer viruses and phishing were particularly common, but 12% had faced hacking as well, and 7%-more than one out of every 15 businesses-had suffered a data breach. The survey also found the companies ill-prepared to protect themselves. Less than half of them had plans in place to protect their employee or customer data.
- Basic knowledge on system administration.
- Basic network administration.
Students will get-
- Will understand the concepts of Cyber Security.
- Will have hands-on knowledge on how things work.
- How to protect data infrastructure from the predators of the Internet.
Organizations use Microsoft Office Excel to track sales ...IT
SPSS Statistics is a GUI and syntax based statistical ...IT
Practical examples, exercises & case studies with ...IT
This course focuses on motion graphics and animation from a ...IT
A. S. M. Shamim Reza
Shamim has been working in the field of Information Security for 8 years. He started his career as a system administrator at Link3 Technologies Ltd, 10 years ago. That time he was responsible for system solution design, manage, administrate and maintenance, etc. After few years he started exploring the security aspect for system and network infrastructure and that drives him to dig deep in to Information Security Domain.
Shamim is still working at Link3 Technologies Ltd and taking care the Infrastructure Security Audit and Maintenance. He is also working on Infrastructure threat hunting and anomaly detection incorporate with Machine Learning, which help him to contribute to the internet infrastructure to make it secure in a better way. He is responsible to implement information security policies, standards, guidelines and procedures to ensure ongoing maintenance of information security for Govt. Institutions and Private Organizations.
Shamim has also presented in national and international conferences and conducted hands-on workshop on Network & System Security, like bdNOG (2018), SANOG (Dhaka, 2018), RootConf (Bengalore, India, 2018), bdNOG (2019), SANOG (Kolkata, India, 2019) etc.