Security experts are much required in every company and industry, regardless of the organization's size and nature. Can help many IT Professionals execute their responsibilities efficiently, from a IT Security Manager to a Network Administrator, App developer and even a Technical Support Engineer. Completing the cyber security course will make you aware of the core concepts of cyber security to succeed with any Certification Courses like CEH, CHFI etc.
Who this course is for ?
The course is ideal for the following IT Professionals who wants to learn the core concept of Cyber security in a more simple and practical way. For any students who wants to start their career in Cyber Security.
By end of this session, the students will have a very good understanding of what Cyber Security is. Difference between Threat, Attack, Threat Agent, Exploitation and Vulnerability. Good understanding of how to systematically identify Threats and eliminate it. Learn the best practices for Cyber Defence and protection.
Will learn the fundamentals of Cryptography and learn the usage of it in CyberSecurity. Know the Cryptography algorithms and its behavior and know which are safe and which are not.
By end of this session, the students will have a very good understanding of information can sent be securely in web and how to prevent data tampering. Learn how hashing is useful in CyberSecurity and the best Hashing Algorithm to use.
By end of this session, the students will have a very good understanding of Digital Certificate and the usage of it and how to safely use it. How Trust work in the real world.
By end of this session, the students will have a very good practical knowledge of how to test, check, create certificates.
By end of this session, the students will have know how a browser works and the interaction between web server and application server. How the data from web page is transfered securely and how it is done.
By end of this session, the students will know how a email works and the interaction between email client and email server. How to send emails securely.
By end of this session, the students will know how malware works and how to protect your computer.
By end of this session, the students will know how authentication and authorization works. Learn the common mistakes in Authentication and Authorization and how to avoid it. How to make authentication more strong.
Shan holds a B.E degree in computer science and engineering. Has over 20 years of experience in Software Industry. He specializes in Information Security, Mobile Technology, IoT and middleware. He is a specialist in Local Language computing who has worked in many indic languages. He was an external consultant to ICTA and Microsoft for addressing Sinhala and Tamil language issues.He is a visiting lecturer at CICRA campus, where he lectures Application Security for Executive MSc. in Information Security and Certificate Course on iOS and Android Security. He was a lecturer at IIT, where he was lecturing iOS, Android, Mobile UX/UI for MSc and BSc. Graduates. He also delivers lectures for Centre for Banking Studies,Central Bank of Sri Lanka. He was the Ex-Direction-Mobile Architecture at WSO2.
Under Shan's supervision, mBrain joined with IIT and started an Advanced CyberSecurity Lab at IIT called MIIT ARCS Lab, there are about 35 research students who are going through training to do advanced research on next generation Cyber Security covering areas like Cryptography, Digital Certificates, Malware & Threat Protection, BlockChain, ML and AI based Security. MIIT Lab undertakes any cyber security research project.