SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
Certified Cyber Security Analyst
VS-1160
Certified Cyber Security Analyst
www.vskills.in
CCCCertifiedertifiedertifiedertified Cyber Security AnalystCyber Security AnalystCyber Security AnalystCyber Security Analyst
Certification CodeCertification CodeCertification CodeCertification Code VS-1160
Vskills certification for Cyber Security Analyst assesses the candidate as per the company’s
need for cyber security and forensics. The certification tests the candidates on various areas
in cybercrime, IT Act 2000, cyberoffenses, wireless devices cybercrime, phishing,
keyloggers, backdoors, SQL injection, DDoS attacks, identity theft, computer and wireless
forensics, cyberterrorism, social media marketing, incident handling and privacy.
Why should one take this certification?Why should one take this certification?Why should one take this certification?Why should one take this certification?
This Course is intended for professionals and graduates wanting to excel in their chosen
areas. It is also well suited for those who are already working and would like to take
certification for further career progression.
Earning Vskills Cyber Security Analyst Certification can help candidate differentiate in
today's competitive job market, broaden their employment opportunities by displaying
their advanced skills, and result in higher earning potential.
Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification?
Job seekers looking to find employment in IT or cyber security departments of various
companies, students generally wanting to improve their skill set and make their CV
stronger and existing employees looking for a better role can prove their employers the
value of their skills through this certification.
Test DetailsTest DetailsTest DetailsTest Details
• Duration:Duration:Duration:Duration: 60 minutes
• No. of questions:No. of questions:No. of questions:No. of questions: 50
• Maximum marks:Maximum marks:Maximum marks:Maximum marks: 50, Passing marks: 25 (50%)
There is no negative marking in this module.
FFFFee Structureee Structureee Structureee Structure
Rs. 4,500/- (Includes all taxes)
Companies that hire VskillsCompanies that hire VskillsCompanies that hire VskillsCompanies that hire Vskills Cyber Security AnalystCyber Security AnalystCyber Security AnalystCyber Security Analyst
Cyber Security Analysts are in great demand. Companies specializing in IT or cyber
security is constantly hiring skilled Cyber Security Analysts. Various public and private
companies also need Cyber Security Analysts for their IT or cyber security departments.
Certified Cyber Security Analyst
www.vskills.in
Table of ContentsTable of ContentsTable of ContentsTable of Contents
1.1.1.1. Introduction to CybercrimeIntroduction to CybercrimeIntroduction to CybercrimeIntroduction to Cybercrime
1.1 Definition and History
1.2 Cybercrime and Information Security
1.3 Who are Cybercriminals and their classifications
1.4 The Legal Perspectives
1.5 An Indian Perspective
1.6 Cybercrime and the Indian ITAct 2000
1.7 A Global Perspective on Cybercrimes
1.8 Survival for the Netizens
1.9 Concluding Remarks and Way Forward to Further Chapters
2.2.2.2. CyberoffensesCyberoffensesCyberoffensesCyberoffenses
2.1 How Criminals Plan the Attacks
2.2 Social Engineering
2.3 Cyberstalking
2.4 Cybercafe and Cybercrimes
2.5 Botnets
2.6 Attack Vector
2.7 Cloud Computing
3.3.3.3. CybercrimeCybercrimeCybercrimeCybercrime and Wireless Devicesand Wireless Devicesand Wireless Devicesand Wireless Devices
3.1 Proliferation of Mobile and Wireless Devices
3.2 Trends in Mobility
3.3 Credit Card Frauds in Mobile and Wireless Computing Era
3.4 Security Challenges Posed by Mobile Devices
3.5 Registry Settings for Mobile Devices
3.6 Authentication Service Security
3.7 Attacks on Mobile/Cell Phones
3.8 Security Implications for Organizations
3.9 Organizational Measures for Handling Mobile
3.10 Organizational Security Policies and Measures in Mobile Computing Era
3.11 Laptops
4.4.4.4. Tools and Methods Used in CybercrimeTools and Methods Used in CybercrimeTools and Methods Used in CybercrimeTools and Methods Used in Cybercrime
4.1 Proxy Servers and Anonymizers
4.2 Phishing
4.3 Password Cracking
4.4 Keyloggers and Spywares
4.5 Virus and Worms
4.6 Trojan Horses and Backdoors
4.7 Steganography
4.8 DoS and DDoS Attacks
4.9 SQL Injection
Certified Cyber Security Analyst
www.vskills.in
4.10 Buffer Overflow
4.11 Attacks on Wireless Networks
5.5.5.5. Phishing and Identity TheftPhishing and Identity TheftPhishing and Identity TheftPhishing and Identity Theft
5.1 Phishing
5.2 Identity Theft (ID Theft)
6.6.6.6. The Legal PerspectivesThe Legal PerspectivesThe Legal PerspectivesThe Legal Perspectives
6.1 Cybercrime and the Legal Landscape around the World
6.2 Cyberlaws in India
6.3 The Indian IT Act
6.4 Challenges to Indian Law and Cybercrime Scenario in India
6.5 Consequences of Not Addressing the Weakness in Information Technology Act
6.6 Digital Signatures and the Indian IT Act
6.7 Amendments to the Indian IT Act
6.8 Cybercrime and Punishment
7.7.7.7. Computer ForensicsComputer ForensicsComputer ForensicsComputer Forensics
7.1 Historical Background of Cyberforensics
7.2 Digital Forensics Science
7.3 The Need for Computer Forensics
7.4 Cyberforensics and Digital Evidence
7.5 Forensics Analysis of E-Mail
7.6 Digital Forensics Life Cycle
7.7 Chain of Custody Concept
7.8 Network Forensics
7.9 Approaching a Computer Forensics Investigation
7.10 Setting up a Computer Forensics Laboratory
7.11 Computer Forensics and Steganography
7.12 Relevance of the OSI 7 Layer Model to Computer Forensics
7.13 Forensics and Social Networking Sites
7.14 Computer Forensics from Compliance Perspective
7.15 Challenges in Computer Forensics
7.16 Special Tools and Techniques
7.17 Forensics Auditing
7.18 Antiforensics
8.8.8.8. Forensics of HandForensics of HandForensics of HandForensics of Hand----Held DevicesHeld DevicesHeld DevicesHeld Devices
8.1 Understanding Cell Phone Working Characteristics
8.2 Hand-Held Devices and Digital Forensics
8.3 Toolkits for Hand-Held Device Forensics
8.4 Forensics of iPods and Digital Music Devices
8.5 An Illustration on Real Life Use of Forensics
8.6 Techno-Legal Challenges with Evidence from Hand-Held Devices
8.7 Organizational Guidelines on Cell Phone Forensics
Certified Cyber Security Analyst
www.vskills.in
9.9.9.9. CybersecurityCybersecurityCybersecurityCybersecurity andandandand OOOOrganizationsrganizationsrganizationsrganizations
9.1 Cost of Cybercrimes and IPR Issues
9.2 Web Threats for Organizations
9.3 Security and Privacy Implications from Cloud Computing
9.4 Social Media Marketing
9.5 Social Computing and the Associated Challenges for Organizations
9.6 Protecting People's Privacy in the Organization
9.7 Organizational Guidelines for Internet Usage
9.8 Safe Computing Guidelines and Computer Usage Policy
9.9 Incident Handling
9.10 Forensics Best Practices for Organizations
9.11 Media and Asset Protection
9.12 Importance of Endpoint Security in Organizations
10.10.10.10. Cybercrime and CyberterrorismCybercrime and CyberterrorismCybercrime and CyberterrorismCybercrime and Cyberterrorism
10.1 Intellectual Property in the Cyberspace
10.2 The Ethical Dimension of Cybercrimes
10.3 The Psychology, Mindset and Skills of Hackers and Other Cybercriminals
10.4 Sociology of Cybercriminals
10.5 Information Warfare
11.11.11.11. CybercrimeCybercrimeCybercrimeCybercrime Case StudyCase StudyCase StudyCase Study
11.1 Real-Life Examples
11.2 Mini-Cases
11.3 Illustrations of Financial Frauds in Cyber Domain
11.4 Digital Signature-Related Crime Scenarios
11.5 Digital Forensics Case Illustrations
11.6 Online Scams
Sample QuestionsSample QuestionsSample QuestionsSample Questions
Certified Cyber Security Analyst
www.vskills.in
1.1.1.1. Computer forensics involves all of the following stated activities exceptComputer forensics involves all of the following stated activities exceptComputer forensics involves all of the following stated activities exceptComputer forensics involves all of the following stated activities except
A. Interpretation of computer data
B. Manipulation of computer data
C. Extraction of computer data
D. None of the above
2222.... A set of instructions compiled into a program that performs a particular task isA set of instructions compiled into a program that performs a particular task isA set of instructions compiled into a program that performs a particular task isA set of instructions compiled into a program that performs a particular task is
known asknown asknown asknown as
A. Central processing unit
B. Software
C. Hardware
D. None of the above
3333.... The smallest addressable unit of datThe smallest addressable unit of datThe smallest addressable unit of datThe smallest addressable unit of data by a HDD generally consists ofa by a HDD generally consists ofa by a HDD generally consists ofa by a HDD generally consists of
A. 64K
B. 8 bits
C. 512 bytes
D. None of the above
4444.... A drive is prepared in three processes. The processes include all of the followingA drive is prepared in three processes. The processes include all of the followingA drive is prepared in three processes. The processes include all of the followingA drive is prepared in three processes. The processes include all of the following
exceptexceptexceptexcept
A. High-level formatting
B. Low-level formatting
C. Partitioning
D. None of the above
5555.... Areas of files and disks that are not apparent to the user, and sometimes not evenAreas of files and disks that are not apparent to the user, and sometimes not evenAreas of files and disks that are not apparent to the user, and sometimes not evenAreas of files and disks that are not apparent to the user, and sometimes not even
to the operating system, is termed asto the operating system, is termed asto the operating system, is termed asto the operating system, is termed as
A. Latent data
B. Hidden data
C. Missing data
D. None of the above
Answers: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)
cyber security analyst certification

Weitere ähnliche Inhalte

Was ist angesagt?

Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...Brian Bissett
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
 
Identity and Access Management Provider
Identity and Access Management ProviderIdentity and Access Management Provider
Identity and Access Management ProviderPriyanka Agarwal
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using BlockchainIRJET Journal
 
FIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in HealthcareFIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in HealthcareFIDO Alliance
 
BlueHat v18 || The law of unintended consequences - gdpr impact on cybersecur...
BlueHat v18 || The law of unintended consequences - gdpr impact on cybersecur...BlueHat v18 || The law of unintended consequences - gdpr impact on cybersecur...
BlueHat v18 || The law of unintended consequences - gdpr impact on cybersecur...BlueHat Security Conference
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking SecurityIRJET Journal
 
Keyloggers A Malicious Attack
Keyloggers A Malicious AttackKeyloggers A Malicious Attack
Keyloggers A Malicious Attackijtsrd
 
Google & FIDO Authentication
Google & FIDO AuthenticationGoogle & FIDO Authentication
Google & FIDO AuthenticationFIDO Alliance
 
How to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First TimeHow to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First TimeMercury Solutions Limited
 
iot hacking, smartlockpick
 iot hacking, smartlockpick iot hacking, smartlockpick
iot hacking, smartlockpickidsecconf
 
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationCisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationNetworkCollaborators
 
UAF Tutorial: Passwordless, Biometric Authentication for Native Apps
UAF Tutorial: Passwordless, Biometric Authentication for Native AppsUAF Tutorial: Passwordless, Biometric Authentication for Native Apps
UAF Tutorial: Passwordless, Biometric Authentication for Native AppsFIDO Alliance
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTForgeRock
 
iSARG Security Group
iSARG Security GroupiSARG Security Group
iSARG Security Groupankittiwaari
 
The Industrial Immune System
The Industrial Immune SystemThe Industrial Immune System
The Industrial Immune SystemJustin Hayward
 
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...Data Con LA
 
Penetration Testing as an auditing tool
Penetration Testing as an auditing toolPenetration Testing as an auditing tool
Penetration Testing as an auditing toolsyrinxtech
 
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...Priyanka Aash
 

Was ist angesagt? (20)

Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
Presentation given at Bio-IT World 2016 as a Senior Member of the IEEE on the...
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
 
Identity and Access Management Provider
Identity and Access Management ProviderIdentity and Access Management Provider
Identity and Access Management Provider
 
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
IRJET-  	  An Approach to Authenticating Devise in IoT using BlockchainIRJET-  	  An Approach to Authenticating Devise in IoT using Blockchain
IRJET- An Approach to Authenticating Devise in IoT using Blockchain
 
FIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in HealthcareFIDO Authentication Opportunities in Healthcare
FIDO Authentication Opportunities in Healthcare
 
BlueHat v18 || The law of unintended consequences - gdpr impact on cybersecur...
BlueHat v18 || The law of unintended consequences - gdpr impact on cybersecur...BlueHat v18 || The law of unintended consequences - gdpr impact on cybersecur...
BlueHat v18 || The law of unintended consequences - gdpr impact on cybersecur...
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
 
Keyloggers A Malicious Attack
Keyloggers A Malicious AttackKeyloggers A Malicious Attack
Keyloggers A Malicious Attack
 
Google & FIDO Authentication
Google & FIDO AuthenticationGoogle & FIDO Authentication
Google & FIDO Authentication
 
How to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First TimeHow to Pass the CISSP Exam For the First Time
How to Pass the CISSP Exam For the First Time
 
iot hacking, smartlockpick
 iot hacking, smartlockpick iot hacking, smartlockpick
iot hacking, smartlockpick
 
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationCisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
 
UAF Tutorial: Passwordless, Biometric Authentication for Native Apps
UAF Tutorial: Passwordless, Biometric Authentication for Native AppsUAF Tutorial: Passwordless, Biometric Authentication for Native Apps
UAF Tutorial: Passwordless, Biometric Authentication for Native Apps
 
Passwordless auth
Passwordless authPasswordless auth
Passwordless auth
 
IDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOTIDENTITY IN THE WORLD OF IOT
IDENTITY IN THE WORLD OF IOT
 
iSARG Security Group
iSARG Security GroupiSARG Security Group
iSARG Security Group
 
The Industrial Immune System
The Industrial Immune SystemThe Industrial Immune System
The Industrial Immune System
 
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
Data Con LA 2019 - Securing IoT Data with Pervasive Encryption by Eysha Shirr...
 
Penetration Testing as an auditing tool
Penetration Testing as an auditing toolPenetration Testing as an auditing tool
Penetration Testing as an auditing tool
 
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...
 

Ähnlich wie cyber security analyst certification

Network Security Certification
Network Security CertificationNetwork Security Certification
Network Security CertificationVskills
 
cyber law analyst certification
cyber law analyst certificationcyber law analyst certification
cyber law analyst certificationVskills
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Brianna Johnson
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxinfosec train
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..Sprintzeal
 
Fundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfFundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfChinatu Uzuegbu
 
What I Learned at RSAC 2020
What I Learned at RSAC 2020What I Learned at RSAC 2020
What I Learned at RSAC 2020Ulf Mattsson
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNAMatteo Masi
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen? Claranet UK
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”Moshiul Islam, CISSP, CISA, CFE
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Moshe Ferber
 
Top Application Security Trends of 2012
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012DaveEdwards12
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
snort certification
snort certificationsnort certification
snort certificationVskills
 
Build your career with top cyber security jobs in 2022?
Build your career with top cyber security jobs in 2022?Build your career with top cyber security jobs in 2022?
Build your career with top cyber security jobs in 2022?InfoSec4TC
 

Ähnlich wie cyber security analyst certification (20)

Network Security Certification
Network Security CertificationNetwork Security Certification
Network Security Certification
 
cyber law analyst certification
cyber law analyst certificationcyber law analyst certification
cyber law analyst certification
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
 
What Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptxWhat Cybersecurity Certifications Make You The Most Money Today.pptx
What Cybersecurity Certifications Make You The Most Money Today.pptx
 
How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..How to Become a Cyber Security Analyst in 2021..
How to Become a Cyber Security Analyst in 2021..
 
Fundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdfFundamentals for Stronger Cloud Security2.pdf
Fundamentals for Stronger Cloud Security2.pdf
 
What I Learned at RSAC 2020
What I Learned at RSAC 2020What I Learned at RSAC 2020
What I Learned at RSAC 2020
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
 
New Horizons SCYBER Presentation
New Horizons SCYBER PresentationNew Horizons SCYBER Presentation
New Horizons SCYBER Presentation
 
Meletis Belsis -CSIRTs
Meletis Belsis -CSIRTsMeletis Belsis -CSIRTs
Meletis Belsis -CSIRTs
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Top Application Security Trends of 2012
Top Application Security Trends of 2012Top Application Security Trends of 2012
Top Application Security Trends of 2012
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
snort certification
snort certificationsnort certification
snort certification
 
Build your career with top cyber security jobs in 2022?
Build your career with top cyber security jobs in 2022?Build your career with top cyber security jobs in 2022?
Build your career with top cyber security jobs in 2022?
 

Mehr von Vskills

Vskills certified administrative support professional sample material
Vskills certified administrative support professional sample materialVskills certified administrative support professional sample material
Vskills certified administrative support professional sample materialVskills
 
vskills customer service professional sample material
vskills customer service professional sample materialvskills customer service professional sample material
vskills customer service professional sample materialVskills
 
Vskills certified operations manager sample material
Vskills certified operations manager sample materialVskills certified operations manager sample material
Vskills certified operations manager sample materialVskills
 
Vskills certified six sigma yellow belt sample material
Vskills certified six sigma yellow belt sample materialVskills certified six sigma yellow belt sample material
Vskills certified six sigma yellow belt sample materialVskills
 
Vskills production and operations management sample material
Vskills production and operations management sample materialVskills production and operations management sample material
Vskills production and operations management sample materialVskills
 
vskills leadership skills professional sample material
vskills leadership skills professional sample materialvskills leadership skills professional sample material
vskills leadership skills professional sample materialVskills
 
vskills facility management expert sample material
vskills facility management expert sample materialvskills facility management expert sample material
vskills facility management expert sample materialVskills
 
Vskills international trade and forex professional sample material
Vskills international trade and forex professional sample materialVskills international trade and forex professional sample material
Vskills international trade and forex professional sample materialVskills
 
Vskills production planning and control professional sample material
Vskills production planning and control professional sample materialVskills production planning and control professional sample material
Vskills production planning and control professional sample materialVskills
 
Vskills purchasing and material management professional sample material
Vskills purchasing and material management professional sample materialVskills purchasing and material management professional sample material
Vskills purchasing and material management professional sample materialVskills
 
Vskills manufacturing technology management professional sample material
Vskills manufacturing technology management professional sample materialVskills manufacturing technology management professional sample material
Vskills manufacturing technology management professional sample materialVskills
 
certificate in agile project management sample material
certificate in agile project management sample materialcertificate in agile project management sample material
certificate in agile project management sample materialVskills
 
Vskills angular js sample material
Vskills angular js sample materialVskills angular js sample material
Vskills angular js sample materialVskills
 
Vskills c++ developer sample material
Vskills c++ developer sample materialVskills c++ developer sample material
Vskills c++ developer sample materialVskills
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample materialVskills
 
Vskills financial modelling professional sample material
Vskills financial modelling professional sample materialVskills financial modelling professional sample material
Vskills financial modelling professional sample materialVskills
 
Vskills basel iii professional sample material
Vskills basel iii professional sample materialVskills basel iii professional sample material
Vskills basel iii professional sample materialVskills
 
Vskills telecom management professional sample material
Vskills telecom management professional sample materialVskills telecom management professional sample material
Vskills telecom management professional sample materialVskills
 
Vskills retail management professional sample material
Vskills retail management professional sample materialVskills retail management professional sample material
Vskills retail management professional sample materialVskills
 
Vskills contract law analyst sample material
Vskills contract law analyst sample materialVskills contract law analyst sample material
Vskills contract law analyst sample materialVskills
 

Mehr von Vskills (20)

Vskills certified administrative support professional sample material
Vskills certified administrative support professional sample materialVskills certified administrative support professional sample material
Vskills certified administrative support professional sample material
 
vskills customer service professional sample material
vskills customer service professional sample materialvskills customer service professional sample material
vskills customer service professional sample material
 
Vskills certified operations manager sample material
Vskills certified operations manager sample materialVskills certified operations manager sample material
Vskills certified operations manager sample material
 
Vskills certified six sigma yellow belt sample material
Vskills certified six sigma yellow belt sample materialVskills certified six sigma yellow belt sample material
Vskills certified six sigma yellow belt sample material
 
Vskills production and operations management sample material
Vskills production and operations management sample materialVskills production and operations management sample material
Vskills production and operations management sample material
 
vskills leadership skills professional sample material
vskills leadership skills professional sample materialvskills leadership skills professional sample material
vskills leadership skills professional sample material
 
vskills facility management expert sample material
vskills facility management expert sample materialvskills facility management expert sample material
vskills facility management expert sample material
 
Vskills international trade and forex professional sample material
Vskills international trade and forex professional sample materialVskills international trade and forex professional sample material
Vskills international trade and forex professional sample material
 
Vskills production planning and control professional sample material
Vskills production planning and control professional sample materialVskills production planning and control professional sample material
Vskills production planning and control professional sample material
 
Vskills purchasing and material management professional sample material
Vskills purchasing and material management professional sample materialVskills purchasing and material management professional sample material
Vskills purchasing and material management professional sample material
 
Vskills manufacturing technology management professional sample material
Vskills manufacturing technology management professional sample materialVskills manufacturing technology management professional sample material
Vskills manufacturing technology management professional sample material
 
certificate in agile project management sample material
certificate in agile project management sample materialcertificate in agile project management sample material
certificate in agile project management sample material
 
Vskills angular js sample material
Vskills angular js sample materialVskills angular js sample material
Vskills angular js sample material
 
Vskills c++ developer sample material
Vskills c++ developer sample materialVskills c++ developer sample material
Vskills c++ developer sample material
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample material
 
Vskills financial modelling professional sample material
Vskills financial modelling professional sample materialVskills financial modelling professional sample material
Vskills financial modelling professional sample material
 
Vskills basel iii professional sample material
Vskills basel iii professional sample materialVskills basel iii professional sample material
Vskills basel iii professional sample material
 
Vskills telecom management professional sample material
Vskills telecom management professional sample materialVskills telecom management professional sample material
Vskills telecom management professional sample material
 
Vskills retail management professional sample material
Vskills retail management professional sample materialVskills retail management professional sample material
Vskills retail management professional sample material
 
Vskills contract law analyst sample material
Vskills contract law analyst sample materialVskills contract law analyst sample material
Vskills contract law analyst sample material
 

Kürzlich hochgeladen

ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptxPoojaSen20
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
How to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 InventoryHow to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 InventoryCeline George
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjMohammed Sikander
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...Nguyen Thanh Tu Collection
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Denish Jangid
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatmentsaipooja36
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesAmanpreetKaur157993
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhleson0603
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...Nguyen Thanh Tu Collection
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...EduSkills OECD
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismDabee Kamal
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSean M. Fox
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................MirzaAbrarBaig5
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMELOISARIVERA8
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....Ritu480198
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppCeline George
 
How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17Celine George
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024Borja Sotomayor
 

Kürzlich hochgeladen (20)

ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
How to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 InventoryHow to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 Inventory
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
IPL Online Quiz by Pragya; Question Set.
IPL Online Quiz by Pragya; Question Set.IPL Online Quiz by Pragya; Question Set.
IPL Online Quiz by Pragya; Question Set.
 

cyber security analyst certification

  • 1. Certified Cyber Security Analyst VS-1160
  • 2. Certified Cyber Security Analyst www.vskills.in CCCCertifiedertifiedertifiedertified Cyber Security AnalystCyber Security AnalystCyber Security AnalystCyber Security Analyst Certification CodeCertification CodeCertification CodeCertification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company’s need for cyber security and forensics. The certification tests the candidates on various areas in cybercrime, IT Act 2000, cyberoffenses, wireless devices cybercrime, phishing, keyloggers, backdoors, SQL injection, DDoS attacks, identity theft, computer and wireless forensics, cyberterrorism, social media marketing, incident handling and privacy. Why should one take this certification?Why should one take this certification?Why should one take this certification?Why should one take this certification? This Course is intended for professionals and graduates wanting to excel in their chosen areas. It is also well suited for those who are already working and would like to take certification for further career progression. Earning Vskills Cyber Security Analyst Certification can help candidate differentiate in today's competitive job market, broaden their employment opportunities by displaying their advanced skills, and result in higher earning potential. Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification? Job seekers looking to find employment in IT or cyber security departments of various companies, students generally wanting to improve their skill set and make their CV stronger and existing employees looking for a better role can prove their employers the value of their skills through this certification. Test DetailsTest DetailsTest DetailsTest Details • Duration:Duration:Duration:Duration: 60 minutes • No. of questions:No. of questions:No. of questions:No. of questions: 50 • Maximum marks:Maximum marks:Maximum marks:Maximum marks: 50, Passing marks: 25 (50%) There is no negative marking in this module. FFFFee Structureee Structureee Structureee Structure Rs. 4,500/- (Includes all taxes) Companies that hire VskillsCompanies that hire VskillsCompanies that hire VskillsCompanies that hire Vskills Cyber Security AnalystCyber Security AnalystCyber Security AnalystCyber Security Analyst Cyber Security Analysts are in great demand. Companies specializing in IT or cyber security is constantly hiring skilled Cyber Security Analysts. Various public and private companies also need Cyber Security Analysts for their IT or cyber security departments.
  • 3. Certified Cyber Security Analyst www.vskills.in Table of ContentsTable of ContentsTable of ContentsTable of Contents 1.1.1.1. Introduction to CybercrimeIntroduction to CybercrimeIntroduction to CybercrimeIntroduction to Cybercrime 1.1 Definition and History 1.2 Cybercrime and Information Security 1.3 Who are Cybercriminals and their classifications 1.4 The Legal Perspectives 1.5 An Indian Perspective 1.6 Cybercrime and the Indian ITAct 2000 1.7 A Global Perspective on Cybercrimes 1.8 Survival for the Netizens 1.9 Concluding Remarks and Way Forward to Further Chapters 2.2.2.2. CyberoffensesCyberoffensesCyberoffensesCyberoffenses 2.1 How Criminals Plan the Attacks 2.2 Social Engineering 2.3 Cyberstalking 2.4 Cybercafe and Cybercrimes 2.5 Botnets 2.6 Attack Vector 2.7 Cloud Computing 3.3.3.3. CybercrimeCybercrimeCybercrimeCybercrime and Wireless Devicesand Wireless Devicesand Wireless Devicesand Wireless Devices 3.1 Proliferation of Mobile and Wireless Devices 3.2 Trends in Mobility 3.3 Credit Card Frauds in Mobile and Wireless Computing Era 3.4 Security Challenges Posed by Mobile Devices 3.5 Registry Settings for Mobile Devices 3.6 Authentication Service Security 3.7 Attacks on Mobile/Cell Phones 3.8 Security Implications for Organizations 3.9 Organizational Measures for Handling Mobile 3.10 Organizational Security Policies and Measures in Mobile Computing Era 3.11 Laptops 4.4.4.4. Tools and Methods Used in CybercrimeTools and Methods Used in CybercrimeTools and Methods Used in CybercrimeTools and Methods Used in Cybercrime 4.1 Proxy Servers and Anonymizers 4.2 Phishing 4.3 Password Cracking 4.4 Keyloggers and Spywares 4.5 Virus and Worms 4.6 Trojan Horses and Backdoors 4.7 Steganography 4.8 DoS and DDoS Attacks 4.9 SQL Injection
  • 4. Certified Cyber Security Analyst www.vskills.in 4.10 Buffer Overflow 4.11 Attacks on Wireless Networks 5.5.5.5. Phishing and Identity TheftPhishing and Identity TheftPhishing and Identity TheftPhishing and Identity Theft 5.1 Phishing 5.2 Identity Theft (ID Theft) 6.6.6.6. The Legal PerspectivesThe Legal PerspectivesThe Legal PerspectivesThe Legal Perspectives 6.1 Cybercrime and the Legal Landscape around the World 6.2 Cyberlaws in India 6.3 The Indian IT Act 6.4 Challenges to Indian Law and Cybercrime Scenario in India 6.5 Consequences of Not Addressing the Weakness in Information Technology Act 6.6 Digital Signatures and the Indian IT Act 6.7 Amendments to the Indian IT Act 6.8 Cybercrime and Punishment 7.7.7.7. Computer ForensicsComputer ForensicsComputer ForensicsComputer Forensics 7.1 Historical Background of Cyberforensics 7.2 Digital Forensics Science 7.3 The Need for Computer Forensics 7.4 Cyberforensics and Digital Evidence 7.5 Forensics Analysis of E-Mail 7.6 Digital Forensics Life Cycle 7.7 Chain of Custody Concept 7.8 Network Forensics 7.9 Approaching a Computer Forensics Investigation 7.10 Setting up a Computer Forensics Laboratory 7.11 Computer Forensics and Steganography 7.12 Relevance of the OSI 7 Layer Model to Computer Forensics 7.13 Forensics and Social Networking Sites 7.14 Computer Forensics from Compliance Perspective 7.15 Challenges in Computer Forensics 7.16 Special Tools and Techniques 7.17 Forensics Auditing 7.18 Antiforensics 8.8.8.8. Forensics of HandForensics of HandForensics of HandForensics of Hand----Held DevicesHeld DevicesHeld DevicesHeld Devices 8.1 Understanding Cell Phone Working Characteristics 8.2 Hand-Held Devices and Digital Forensics 8.3 Toolkits for Hand-Held Device Forensics 8.4 Forensics of iPods and Digital Music Devices 8.5 An Illustration on Real Life Use of Forensics 8.6 Techno-Legal Challenges with Evidence from Hand-Held Devices 8.7 Organizational Guidelines on Cell Phone Forensics
  • 5. Certified Cyber Security Analyst www.vskills.in 9.9.9.9. CybersecurityCybersecurityCybersecurityCybersecurity andandandand OOOOrganizationsrganizationsrganizationsrganizations 9.1 Cost of Cybercrimes and IPR Issues 9.2 Web Threats for Organizations 9.3 Security and Privacy Implications from Cloud Computing 9.4 Social Media Marketing 9.5 Social Computing and the Associated Challenges for Organizations 9.6 Protecting People's Privacy in the Organization 9.7 Organizational Guidelines for Internet Usage 9.8 Safe Computing Guidelines and Computer Usage Policy 9.9 Incident Handling 9.10 Forensics Best Practices for Organizations 9.11 Media and Asset Protection 9.12 Importance of Endpoint Security in Organizations 10.10.10.10. Cybercrime and CyberterrorismCybercrime and CyberterrorismCybercrime and CyberterrorismCybercrime and Cyberterrorism 10.1 Intellectual Property in the Cyberspace 10.2 The Ethical Dimension of Cybercrimes 10.3 The Psychology, Mindset and Skills of Hackers and Other Cybercriminals 10.4 Sociology of Cybercriminals 10.5 Information Warfare 11.11.11.11. CybercrimeCybercrimeCybercrimeCybercrime Case StudyCase StudyCase StudyCase Study 11.1 Real-Life Examples 11.2 Mini-Cases 11.3 Illustrations of Financial Frauds in Cyber Domain 11.4 Digital Signature-Related Crime Scenarios 11.5 Digital Forensics Case Illustrations 11.6 Online Scams Sample QuestionsSample QuestionsSample QuestionsSample Questions
  • 6. Certified Cyber Security Analyst www.vskills.in 1.1.1.1. Computer forensics involves all of the following stated activities exceptComputer forensics involves all of the following stated activities exceptComputer forensics involves all of the following stated activities exceptComputer forensics involves all of the following stated activities except A. Interpretation of computer data B. Manipulation of computer data C. Extraction of computer data D. None of the above 2222.... A set of instructions compiled into a program that performs a particular task isA set of instructions compiled into a program that performs a particular task isA set of instructions compiled into a program that performs a particular task isA set of instructions compiled into a program that performs a particular task is known asknown asknown asknown as A. Central processing unit B. Software C. Hardware D. None of the above 3333.... The smallest addressable unit of datThe smallest addressable unit of datThe smallest addressable unit of datThe smallest addressable unit of data by a HDD generally consists ofa by a HDD generally consists ofa by a HDD generally consists ofa by a HDD generally consists of A. 64K B. 8 bits C. 512 bytes D. None of the above 4444.... A drive is prepared in three processes. The processes include all of the followingA drive is prepared in three processes. The processes include all of the followingA drive is prepared in three processes. The processes include all of the followingA drive is prepared in three processes. The processes include all of the following exceptexceptexceptexcept A. High-level formatting B. Low-level formatting C. Partitioning D. None of the above 5555.... Areas of files and disks that are not apparent to the user, and sometimes not evenAreas of files and disks that are not apparent to the user, and sometimes not evenAreas of files and disks that are not apparent to the user, and sometimes not evenAreas of files and disks that are not apparent to the user, and sometimes not even to the operating system, is termed asto the operating system, is termed asto the operating system, is termed asto the operating system, is termed as A. Latent data B. Hidden data C. Missing data D. None of the above Answers: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)