All Courses

Choose a category

Mechanical

Electrical

Civil

Computer Science

Electronics

Offline Program

All Courses

All Courses

logo

POPULAR COURSES

coursePost Graduate Program in Hybrid Electric Vehicle Design and Analysis
coursePost Graduate Program in Computational Fluid Dynamics
coursePost Graduate Program in CAD
coursePost Graduate Program in CAE
coursePost Graduate Program in Manufacturing Design
coursePost Graduate Program in Computational Design and Pre-processing
coursePost Graduate Program in Complete Passenger Car Design & Product Development

Book a Class, for FREE

Syllabus

This course is full of best-in-class content by leading faculty and industry experts in the form of videos and projects

Course Overview

  • This course discusses enterprise security architecture and the various control structures for both infrastructure and applications. 
  • The course covers data protection, risk and compliance, cloud security, advanced threats, cyber infra security and IAM solutions. 
  • Several security elements, such as networking models and security architecture, will also be discussed

Course Syllabus

On a daily basis we talk to companies in the likes of Tata Elxsi and Mahindra to fine tune our curriculum.

Week 01 Introduction to Enterprise Security

  • In this week, we will learn about the following 
    • The gap in “securities” skill
    • Prerequisites for the course
    • Course Schema
    • Topics to be covered in the course

Week 02 Understanding Enterprise Security Landscape

  • In this module, we will learn about the follwing 
    • Enterprise security landscape
    • The five most attacked industries
    • Security breaches
    • Understanding common terminologies
    • Current threats
    • Most common cyber attacks and countermeasures

Week 03 Security Elements

  • In this module, we will learn about the following 
    • ISO/OSI Model
    • TCP/IP Model
    • TCP/IP and OSI Model
    • Introduction to the CIA Triad

Week 04 Network Fundamentals

  • In this module, we will learn about the following 
    • The basics of LAN
    • LAN topologies
    • Network switch
    • Explain VLAN
    • Router
    • Perimeter security components
    • Defense in depth

 

Week 05 Beyond the Basic Network

  • In this module, we will learn about the following 
    • Wireless networks overview
    • IEEE standard for wireless network communication
    • Securing the SSID
    • Secure encryption protocols
    • General Wi-Fi security procedure
    • Wireless attacks
    • Wi-Fi hacking
    • Introduction to cloud computing

Week 06 Enterprise Security Architecture

  • In this module, we will learn about the following  
    • The three-tier architecture
    • SSL/TLS
    • History
    • Overview
    • Handshake protocol
    • Internet service hardening
    • Secure code development
    • Code quality and testing

Week 07 Risk Management

  • In this module, we will learn about the follwoing  
    • Security Program
      • Security program development
      • Enterprise architecture development
      • Security control development
      • Process management development
    • Enterprise Security Architecture
      • Checklist to identify the need
      • Components that successfully develop and implement

Week 08 Security Maturity Model

  • In this module, we will learn about the following  
    • Security Testing
    • No-Knowledge Tests (Black Box)
    • Full-Knowledge Testing (White Box)
    • Partial-Knowledge Testing (Gray Box)
    • Security Testing types
    • Hacker and Cracker Description
    • Skill-set of Ethical Hackers
    • Modes of Ethical Hacking
    • Rules for ethical hacker

Week 09 Identity and Access Management

  • In this module, we will learn about the following 
    • Risk
    • Threat actors
    • Types of threat actors
    • Managing risk
    • Using guides for risk assessment
    • Security control
    • IT security governance
    • Quantitative risk calculation

Week 10 Identity and Access Management

  • In this module, we will learn about the following 
    • Overview of IAAA
    • Basic concepts in access control
    • Identity Management
    • Single/Multiple Factor Authentication
    • Identity as a Service (IDaaS)
    • Authorization Mechanisms

Week 11 Security Model

  • In this module, we will learn about the following  
    • Key terminologies
    • Security Models
    • Bell-LaPadula Model
    • Biba Model
    • Brewer and Nash Model
    • Graham-Denning Model

Week 12 Securing Assets

  • In this module, we will learn about the following  
    • What is an Asset?
    • Configuration Management
    • Host Hardening
    • Patch Management
    • RAID
    • Physical Hardening

Our courses have been designed by industry experts to help students achieve their dream careers

Industry Projects

Our projects are designed by experts in the industry to reflect industry standards. By working through our projects, Learners will gain a practical understanding of what they will take on at a larger-scale in the industry. In total, there are 2 Projects that are available in this program.

Design Enterprise Security Model

In this project, design a security model for a banking application to secure the website of the bank having certain components.

Comprehensive Risk Rating System (CRRS)

  • Based on the previous project, devise a risk rating system that will give the quantitative risk of the bank's assets and help the bank identify its mission-critical assets. Devise a formula for calculating the overall risk of “mybank” corporation.

Our courses have been designed by industry experts to help students achieve their dream careers

Ratings & Reviews by Learners

Skill-Lync has received honest feedback from our learners around the globe.

Google Rating
4.8

Flexible Pricing

Talk to our career counsellors to get flexible payment options.

Premium

INR 40,000

Inclusive of all charges


Become job ready with our comprehensive industry focused curriculum for freshers & early career professionals

  • 1 Year Accessto Skill-Lync’s Learning Management System (LMS)

  • Personalized Pageto showcase Projects & Certifications

  • Live Individual & Group Sessionsto resolve queries, Discuss Progress and Study Plans.

  • Personalized & Hands-OnSupport over Mail, Telephone for Query Resolution & Overall Learner Progress.

  • Job-Oriented Industry Relevant Curriculumavailable at your fingertips curated by Global Industry Experts along with Live Sessions.

Instructors profiles

Our courses are designed by leading academicians and experienced industry professionals.

image

1 industry expert

Our instructors are industry experts along with a passion to teach.

image

15 years in the experience range

Instructors with 15 years extensive industry experience.

image

Areas of expertise

  • Cyber Security
  • Digital Forensics
  • Information Technology

Similar Courses

Design Patterns for Building Scalable Applications
Recently launched

19 Hours of Content

Programming the Internet of Things (IOT)
Recently launched

18 Hours of Content

Got more questions?

Talk to our Team Directly

Please fill in your number & an expert from our team will call you shortly.

Please enter a valid number

© 2025 Skill-Lync Inc. All Rights Reserved.