• Option Chain
  • Market Turnover
  • Listings
  • IPO
  • Circulars
  • Daily Report
  • Holidays
  • Corporates
  • Press Releases
  • Contact Us
  • English
    • English
    • हिन्दी (Hindi)
    • मराठी (Marathi)
    • ગુજરાતી (Gujarati)
    • বাংলা (Bengali)
    • ಕನ್ನಡ (Kannada)
    • தமிழ் (Tamil)
    • తెలుగు (Telugu)
    • ਪੰਜਾਬੀ (Punjabi)
    • മലയാളം (Malayalam)
    • ଓଡ଼ିଆ (Oriya)
    • অসমীয়া (Assamese)
    • اردو (Urdu)
GiftNiftyFutures 28-Aug-2025
24,617.50 -37.50 (-0.15%)

15-Aug-2025 02:47

26-Aug-2025 | 87.6475

14-Aug-2025 17:00

Lac Crs 441.65 | Tn $ 5.05

14-Aug-2025

Login to

You will be redirected to
another link to complete the login

Feedback
Login to Mutual Fund, NCFM
Bootcamp-Cyber Security

Bootcamp-Cyber Security

TOTAL DURATION TRAINING CERTIFICATE COURSE TYPE
5 Days

No Expiry Date

Online

For more information, please Contact: 
Session Coordinator - +91 8879918720
Email id: gokulnathhr@nse.co.in

NSE Academy Cybersecurity Bootcamp is a five-day online immersion experience on ethical hacking and cybersecurity measures. You will perform a Controlled Hacking Attack and respond to mitigate the simulated attack. You will gain insights for real-world applications of cybersecurity as you progress through the project milestones.

 

Outline:

  • Cyber Attacks
  • Firewall and VPN
  • Encryption Techniques
  • Cybersecurity Laws and Compliance

Project: Perform a Controlled Hacking Attack and respond to mitigate the simulated attack

Get mentored by successful Tech Leaders with rich professional experience of leading technological innovations in diverse sectors.

 

Project Milestones:

Day 1

  • Identify key cybersecurity threats
  • Describe best practices for securing personal and organizational data

 

Day 2

  • Configure a basic firewall and set up a VPN
  • Appreciate the role of firewalls in protecting network traffic

 

Day 3

  • Apply encryption techniques to secure data
  • Understand the operation of algorithms like RSA and AES

 

Day 4

  • Engage in a controlled hacking exercise
  • Draft an incident response to mitigate the simulated attack

 

Day 5 

  • Understand key cybersecurity laws and compliance requirements
  • Evaluate the ethical implications
  • Kali
  • Metasploit
  • WireShark
  • OWASP
  • Desktop or Laptop must for Projects.
  • No Specific OS/Hardware requirements, however we recommend computers with 3rd-gen processors or higher, for best learning experience.
  • The mentorship will be on video conferencing platforms (like Zoom), and can be joined from smartphones.
Updated on: 10/06/2024