HCLTech Syllabus Structure - Amity Online MCA Cybersecurity Specialist Program v3
HCLTech Syllabus Structure - Amity Online MCA Cybersecurity Specialist Program v3
15 30 25 25 55 150
1. Information Security Fundamentals: Understanding the basics of information security and its
critical role in protecting data from unauthorized access, disclosure, or alteration.
2. Cybersecurity Awareness: Developing the ability to recognize common cybersecurity threats and
vulnerabilities that could compromise data integrity and privacy.
3. Encryption Techniques: Learning about encryption methods and their applications in
safeguarding sensitive information from eavesdropping or unauthorized access.
4. Cloud Security: Understanding different cloud computing models and the security considerations
associated with them, including best practices for securing cloud-based resources and services.
5. Compliance and Risk Management: Recognizing the importance of risk management in business
operations, understanding regulatory compliance frameworks, and acquiring skills to create and
implement effective compliance programs to meet legal and industry standards.
1. Learners will understand and articulate the core principles of information security and its
significance in safeguarding sensitive data.
2. learners will be able to identify and describe various cybersecurity threats and vulnerabilities,
including malware, phishing, and social engineering.
3. After completion, learners will have the skills to describe and apply encryption methods for
securing data during transmission and storage.
4. Learners will differentiate between cloud service models (e.g., IaaS, PaaS, SaaS) and discuss the
associated security considerations, while also implementing security controls and best practices
for data and application protection in a cloud environment.
5. Upon completion, learners will be equipped to identify and explain key cloud compliance
standards, recognize the role of risk management in decision-making, and design and implement
compliance programs to adhere to industry-specific regulations and standards.
•
•
•
Labs : The learning objectives of the labs mentioned are related to cybersecurity and ethical
hacking. These labs are designed to teach individuals about various cybersecurity threats,
vulnerabilities, and attack techniques. Learning objectives for each lab:
Degree - MCA - Cybersecurity Specialist
10. Configure AWS VPC (VPC, Subnets, Routing, VPC Peering, etc.) (AWS):
11. Monitor EC2 Instances using CloudWatch and Configuring Alerts (AWS):
12. Create and Manage S3 Buckets, Upload Objects with Customized Permissions (AWS):
13. Creating and Managing IAM Users, Groups, and Policies (AWS):
15 30 25 25 55 150
Threat Intelligence Fundamentals: Understanding the basics of threat intelligence, including its sources,
types, and its crucial relevance in cybersecurity for proactive threat identification.
Threat Hunting Skills: Developing the ability to proactively hunt for threats by learning various
techniques and strategies to identify and mitigate potential security risks.
Threat Intelligence Sharing: Learning about the importance of sharing threat intelligence within the
cybersecurity community to enhance collective security and response capabilities.
Incident Response Lifecycle: Understanding the complete incident response process, from initial
detection through containment, recovery, and post-incident analysis to learn lessons and improve
security measures.
Vulnerability Assessment and Management: Gaining insights into vulnerability assessment basics,
vulnerability scanning techniques, and strategies for managing and remediating security weaknesses to
enhance overall security posture.
Learners will be able to define threat intelligence, identify various sources, and understand its role in
enhancing security.
After completion, learners will possess the skills to conduct threat hunting exercises using various
methods to proactively identify and respond to potential threats within an organization's network.
Learners will understand the benefits of sharing threat intelligence, actively participate in threat
information sharing groups, and contribute to collective defense against cyber threats.
Upon completion, learners will have the ability to explain each phase of the incident response lifecycle,
perform appropriate actions, and effectively communicate incident details to relevant stakeholders.
Degree - MCA - Cybersecurity Specialist
After completing the training, learners will be equipped to define vulnerability assessment, use scanning
tools, prioritize vulnerabilities, and develop and implement effective vulnerability management
programs to maintain a secure environment.
Labs : The learning objectives of the labs mentioned are related to cybersecurity and ethical
hacking. These labs are designed to teach individuals about various cybersecurity threats,
vulnerabilities, and attack techniques. Learning objectives for each lab:
15 30 25 25 55 150
Learners will be able to explain fundamental concepts of secure software development and
emphasize the importance of application security in preventing vulnerabilities and breaches.
Upon completion, learners will possess the ability to recognize and describe various application
security vulnerabilities, applying best practices to mitigate these issues throughout the software
development lifecycle.
After the training, learners will be skilled in conducting security assessments of applications
using techniques like penetration testing and code review to identify and address security
weaknesses.
Learners will be equipped to categorize data by sensitivity, implement encryption measures for
data protection, establish access controls, and ensure compliance with data security regulations
and privacy standards.
Degree - MCA - Cybersecurity Specialist
After completing the training, learners will have the capacity to define malware, categorize
different types of malwares, describe common malware behaviors, and perform malware
analysis to enhance their organization's security defenses.
Module 3: Security Testing Techniques & Secure API and Web Services Development
• Static analysis (code review)
• Dynamic analysis (penetration testing)
• Automated security scanning tools
• API security best practices
• OAuth and token-based authentication
• API security testing
• Secure deployment practices
• Secure configuration management
• Secure DevOps and CI/CD pipeline integration
• User authentication methods
• Role-based access control (RBAC)
• Single Sign-On (SSO)
• Data classification and encryption
• Data leakage prevention
• Data retention and disposal
• Incident response planning
• Patch management best practices
• Handling security incidents in applications
• Relevant regulations (e.g., GDPR, HIPAA)
• Compliance auditing and reporting
• Mobile application security
• Cloud application security
• DevSecOps and container security
Degree - MCA - Cybersecurity Specialist
15 30 25 25 55 150
SIEM Fundamentals: Understanding the core principles of Security Information and Event Management
(SIEM) and its essential role in security operations for monitoring and threat detection.
SIEM Configuration and Management: Developing the skills required to configure and manage a SIEM
system effectively to collect and analyze security data.
Threat Detection and Incident Response: Learning how to utilize SIEM for threat detection and incident
response, including analyzing logs, correlating events, and generating alerts.
Compliance and Reporting: Gaining knowledge of how SIEM systems can be used for compliance
monitoring and reporting to meet regulatory requirements.
UEBA and Threat Detection: Understanding the principles of User and Entity Behavior Analytics (UEBA)
and its significance in identifying threats through anomaly detection, behavior analysis, and machine
learning, as well as its use cases in insider threat detection, fraud prevention, and more.
Learners will be able to explain core SIEM concepts, emphasizing the importance of log management,
correlation, and real-time monitoring in detecting and responding to security incidents.
Upon completion, learners will have the capability to set up and configure a SIEM system, integrate data
sources, and customize rules, dashboards, and reports.
Degree - MCA - Cybersecurity Specialist
After the training, learners will be skilled in using SIEM for identifying and analyzing security incidents,
including advanced persistent threats (APTs), and responding appropriately.
Learners will possess the ability to analyze logs from various sources, correlate events to detect
anomalies and threats, and configure alerts to notify security personnel.
After completing the training, learners will be proficient in creating compliance reports using SIEM data,
meeting regulatory requirements, developing incident response plans, and using SIEM for automating
security tasks and orchestrating incident response actions to enhance efficiency and effectiveness.