Cyber Security ~ Eth!c@l H@ck Squad

Overview

Welcome to our AION Cyber Campus Sri Lanka’s premier Cyber Security Education institute.

In just 3 months, we’ll transform your interest in Hacking into a valuable cyber security skill that in high demand across industries.

Our Ethical Hacking & Cyber Security Certificate program is specifically designed for students who have just completed O/L ‘s and are looking for a field of study. We invite you to join & explore the exciting world of cyber security.

Why should you select Aion as your place to study?

Intake

April / September / December

Duration

3 Months

Delivery

Hybrid

What will you get

CYBER FUTURES
CYBER FUTURES

Learning outcomes

Content

Content topics and subtopics are carefully designed to give you a good exposure into Cyber Security.

Professional Certifications Guidance

image
image
image
image
image
image
image
image
image
image
image
image
image
image

Industry Partnerships

Module Name Content
Introduction to Cyber Security
Principals of Cyber Security
Security Controls
Network Security
Cryptography
Information Risk Management
Cyber Security Threats (SOC & Incident Handling)
Introduction to Digital Forensic
Introduction to Penetration Testing
Module Name Content
Security Operations
Incident response and management
Incident Handling Training: Ability to identify, assess, and respond to security incidents promptly and effectively.
Security policies, procedures, and best practices
Security auditing and compliance
Hands-on Security Operations Center (SOC) Training
Cyber Security Threats (SOC & Incident Handling)
Hands-on SIEM Training: This experience allows you to become proficient in configuring, monitoring, and customizing the SIEM solution, as well as comprehending its reporting and alerting capabilities
Module Name Content
Information Security Management and Architecture
Security Architecture and Design
Security and Risk Management
Designing, Developing, and Maintaining an Enterprise Information Security Program
Legal, Regulations, Investigations and Compliance
Business Continuity and Disaster Recovery Management/Planning
Strategic Planning, Finance, Procurement and Vendor Management
Module Name Content
Vulnerability Assessment
Identifying and assessing vulnerabilities
Hands-on-experience on vulnerability scanning and analysis tools
Hands-on experience on industry-leading vulnerability tools like Nessus, and Qualys and vulnerability tools like Nessus, Qualys, and OWASP ZAP.
Mitigation strategies and solutions
Module Name Content
Penetration Testing
Overview of penetration testing
Preparation and conducting penetration tests
Reporting and remediation process
Module Name Content
Application Security
Identifying the need for security in software
Secure software development practices
Implementing common protections
Cryptography
Maintaining security in deployed software
Module Name Content
Business English
Effective communication in a professional setting
Business writing and documentation
Interpersonal skills in a workplace
Personal Branding
Professional grooming
Business Etiquettes
Presentation and negotiation skills