Dunster Business School

Auto-Update Event Message
Join us April 21-22 for our 2025 Lectures | Register Now

Diploma in Cyber Security

About Diploma in Cyber Security

The Diploma in Cyber Security at Dunster Business School is a comprehensive program designed for individuals seeking to build foundational skills and advanced expertise in cybersecurity. It is tailored for both beginners and professionals. The diploma provides a blend of theoretical knowledge and practical applications to address the growing challenges in the field of cybersecurity.

Level

Diploma

Duration

144 Hours

Delivery Mode

Online

Key Highlights

  1. Expert Faculty: Learn from industry professionals with extensive experience.

  2. Industry-Relevant Curriculum: Covers the latest tools, technologies, and trends in cybersecurity.
  3. Practical Training: Hands-on projects and simulations for real-world problem-solving.

  4. Networking Opportunities: Connect with peers, alumni, and industry experts through workshops and events.
  5. State-of-the-art LMS: State-of-the-art Learning Management System.

Program Outcomes

  1. Develop an understanding of cybersecurity principles and practices.

  2. Gain expertise in network security, cryptography, and ethical hacking.

  3. Learn to identify and mitigate security vulnerabilities and threats.
  4. Be proficient in using tools like firewalls, SIEM systems, and penetration testing software.

  5. Design and implement robust cybersecurity policies and frameworks.

Career Path

Industries hiring cybersecurity professionals include IT, finance, healthcare, government, and e-commerce. Here are some potential career opportunities:

  • – Cybersecurity Analyst
  • – Network Security Engineer
  • – Ethical Hacker
  • – Incident Response Specialist
  • – Information Security Consultant
  • – Penetration Tester

Curriculum

The curriculum for the diploma is structured to provide a holistic understanding of cybersecurity. The modules include risk management, ethical hacking, and network security. Participants will engage in hands-on projects, simulations, and case studies to apply their knowledge.

In this module the candidate will learn about Security Essentials, the need of Cyber Security, CIA Triad, Vulnerability, Thread, and Risk, Risk Governance and Management, Security Architecture, Governance and Auditing, Computer Security and Design.

    • The need for Cyber Security
    • CIA Triad
    • Vulnerability, Threat, and Risk
    • Risk Governance & Risk Management
    • Security Architecture
    • Security Governance
    • Security Auditing
    • Compliance
    • Computer Security Architecture & Design
    • Quiz Module 1

In this module the candidate will learn about Background of Cryptography, Symmetric Cryptography, Data Encryption, Triple DES, The Advanced Encryption Standard and International Data Encryption Algorithm. Other topics such as what is Blowfish, RC4, RC5, RC6, Asymmetric Cryptography, The Diffie- Hellman Algorithm, RSA, ECC, Cryptographic Hash Functions, Digital certificates and its life cycle will also be explained.

    • Background of Cryptography
    • Symmetric Cryptography
    • Data Encryption Standard (DES)
    • Triple-DES
    • The Advanced Encryption Standard (AES)
    • International Data Encryption Algorithm (IDEA)
    • Blowfish
    • RC4
    • RC5
  • RC6
  • Asymmetric Cryptography
  • The Diffie-Hellman Algorithm
  • RSA
  • Elliptic Curve Cryptosystems (ECC)
  • Cryptographic Hash Functions
  • Attacks against Encrypted Data
  • Digital Certificates and its Format (X.509, X.500)
  • Certificate Authority, Certificate Repository, Certificate Revocation lists
  • Digital Certificate life cycle (Initialize, Issue, Cancel)
  • Quiz Module 2

In this module the candidate will learn about Network and Layered Architecture, Transmission Control Protocol, Hybrid TCP/IPModel, Application, Layer Protocols, Transport Layer Protocols, Network and Internet Protocols, Link layer and Resolution Protocols.

    • Network Architecture, Protocols and Technologies:
    • Layered Architecture, Open Systems Interconnect (OSI) Model
    • Transmission Control Protocol / Internet Protocol (TCP/IP)
    • Hybrid TCP/IP Model
    • Application Layer Protocols: HTTP, SNMP, DNS, POP, SMTP
    • Transport layer protocols: Transmission Control Protocol (TCP), User Datagram Protocol (UDP)
    • Network/Internet layer protocols:
    • Internet Protocol (IP) v4, IPv6, IPsec protocols
    • Link-layer protocols: Address
    • Resolution Protocol (ARP) / Reverse ARP / Proxy ARP, Ethernet, VLAN
    • Quiz Module 3
  • SSDLC (Secure Software Development Life Cycle)
  • Quiz Module 4
  • Data Security
  • Data Security Controls
  • Host/ Endpoint Security Controls
  • Quiz Module 5
  • Authorization
  • Authentication
  • Access Control
  • Privilege levels
  • Identity & Access Management Process and activities (Role-Based, Single Sign-on)
  • Quiz Module 6
  • Cloud Computing Architectural Framework
  • Concerns & Best Practices
  • Governance and Enterprise Risk Management
  • Legal Issues: Contracts and Electronic Discovery
  • Compliance and Audit Management
  • Information Management and Data Security
  • Interoperability and Portability
  • Traditional Security, Business Continuity, and Disaster Recovery
  • Data Centre Operations
  • Incident Response
  • Application Security
  • Encryption and Key Management
  • Identity, Entitlement, and Access Management
  • Virtualization
  • Security as a Service
  • Quiz Module 7
  • Phase 1 —Reconnaissance: Adversary identifies and selects a Target
  • Phase 2 —Weaponize: Adversary packages an exploit into a payload designed to execute on the targeted computer/network
  • Phase 3 —Deliver: Adversary delivers the payload to the target system
  • Phase 4 —Exploit: Adversary code is executed on the target system
  • Phase 5 —Install: Adversary installs remote access software that provides a persistent presence within the targeted environment or system
  • Phase 6 —Command and Control: Adversary employs remote access mechanisms to establish a command and control channel with the compromised device
  • Phase 7 —Act on Objectives: Adversary pursues intended objectives e.g., data exfiltration, lateral movement to other targets
  • Quiz Module 8
  • Key Security Business Processes
  • Corp. & Security Governance
  • IT Strategy management
  • Portfolio/Program/Project management
  • Change management
  • Supplier (third party) management
  • Problem management
  • Knowledge management
  • Info-sec management
  • BCP
  • IT Operations management
  • Overview of top 20 security controls
  • Quiz Module 9
  • Business Communication
  • Preparation for the Interview
  • Presentation Skills
  • Resume Writing

Shape Your Tomorrow ,Today

Fill out the Admission Enquiry Form below if you have any queries regarding the admission procedure.

Certification

Reviews

"The Diploma in Cyber Security at Dunster Business School is a game-changer. The hands-on projects and industry-aligned curriculum prepared me to excel in my role."
Bernard Kellar
Cybersecurity Analyst
"This Diploma in Cyber Security at Dunster Business School gave me the skills and confidence to transition into cybersecurity. The networking opportunities were invaluable. Received excellent support from the faculty."
Piyush Kalra
Ethical Hacker
" I was hesitant to venture into the field of Cybersecurity at first. But the support, knowledge and real-world projects made me confident. Thanks to Dunster Business School."
Ross Mathew
Student

Frequently Asked Questions

Who is eligible for the diploma in Cyber Security?

The program is open to individuals with a high school diploma or equivalent. Prior knowledge of IT or networking is beneficial but not mandatory.

Yes, a Diploma in Cyber Security is available online at Dunstr Business School.

Yes, the curriculum aligns with certifications like CompTIA Security+, CEH, and CISSP.

The learning materials are provided to students through the LMS. Learners are provided with self-learning, quiz banks, assessments and projects.

Dunster Business School offers career services, including resume workshops, mock interviews, and job placement assistance.

Open chat
Hello
Can we help you?