1. Nmap and Nmap History
  2. Working In a High School As A Computer Instructor
  3. Penetration Testing Jobs in worldwide – A Valuable Online Resource
  4. Types of computer software
  5. Cross-site scripting (XSS) attack
  6. Five Best Cyber Security and Ethical Hacking Private Degrees in Sri Lanka
  7. Google’s open-source tsunami vulnerability scanner
  8. What is Google? (Tutorial)
  9. What is a SQL Injection Attack?
  10. Is WordPress Easy?
  11. How to find a perfect domain name for your website (10+ Tips and Tricks Tutorial)
  12. 6 new vulnerabilities with D-Link home routers allow hackers to launch remote attacks
  13. What is the YouTube and YouTube AdSense?
  14. C++ Lesson 6 – Storage of information through user interactions and VARIABLES
  15. How to get full root Access by Termux without Root?
  16. Trojan horse’s Story | who is this Trojan horse
  17. Don’t use these wallpapers in your mobile phone – System Crash wallpaper issue
  18. Burp Suite pro [Professional 2020.4.1]
  19. Website SEO checker tool
  20. What is DNS? (Domain Name System)
  21. C++ Lesson 5 – Get ready for the first program – Part 2
  22. Whatsapp Secrets Code List
  23. Python Lesson 1 – Python and Computer Programming
  24. C++ Lesson 4 – Get ready for the first program
  25. C++ Lesson 3 – Setting the background PROGRAMMING for LINUX.
  26. What is an Email? (Learn about Email)
  27. GoDaddy reveals a data breach, exposing the credentials of the web hosting account
  28. C++ Lesson 2: Setting the PROGRAMMING Background for WINDOWS
  29. C++ full tutorial | How to start C++ | Part 001
  30. What is the IP Address? – Full Tutorial
  31. How to install Kali Linux in windows Computer using virtualBox – 001
  32. Online YouTube Backlink Generator Tool
  33. How to use ShellPhish in mobile phone – Advance Phishing tool
  34. Remote Command Execution (R.C.E) vulnerability
  35. Mobile phone Ethical Hacking & Penetration Testing platform (Termux)
  36. Nmap network scanning (Basic Tutorial for Beginers) – 002
  37. Nmap Port Scanning tool (Basic Tutorial for Beginers) – 001
  38. Penetration Testing and Ethical Hacking Linux Distribute – Kali Linux
  1. Nmap and Nmap History
  2. Working In a High School As A Computer Instructor
  3. Penetration Testing Jobs in worldwide – A Valuable Online Resource
  4. Types of computer software
  5. Cross-site scripting (XSS) attack
  6. Five Best Cyber Security and Ethical Hacking Private Degrees in Sri Lanka
  7. Google’s open-source tsunami vulnerability scanner
  8. What is Google? (Tutorial)
  9. What is a SQL Injection Attack?
  10. Is WordPress Easy?
  11. How to find a perfect domain name for your website (10+ Tips and Tricks Tutorial)
  12. 6 new vulnerabilities with D-Link home routers allow hackers to launch remote attacks
  13. What is the YouTube and YouTube AdSense?
  14. C++ Lesson 6 – Storage of information through user interactions and VARIABLES
  15. How to get full root Access by Termux without Root?
  16. Trojan horse’s Story | who is this Trojan horse
  17. Don’t use these wallpapers in your mobile phone – System Crash wallpaper issue
  18. Burp Suite pro [Professional 2020.4.1]
  19. Website SEO checker tool
  20. What is DNS? (Domain Name System)
  21. C++ Lesson 5 – Get ready for the first program – Part 2
  22. Whatsapp Secrets Code List
  23. Python Lesson 1 – Python and Computer Programming
  24. C++ Lesson 4 – Get ready for the first program
  25. C++ Lesson 3 – Setting the background PROGRAMMING for LINUX.
  26. What is an Email? (Learn about Email)
  27. GoDaddy reveals a data breach, exposing the credentials of the web hosting account
  28. C++ Lesson 2: Setting the PROGRAMMING Background for WINDOWS
  29. C++ full tutorial | How to start C++ | Part 001
  30. What is the IP Address? – Full Tutorial
  31. How to install Kali Linux in windows Computer using virtualBox – 001
  32. Online YouTube Backlink Generator Tool
  33. How to use ShellPhish in mobile phone – Advance Phishing tool
  34. Remote Command Execution (R.C.E) vulnerability
  35. Mobile phone Ethical Hacking & Penetration Testing platform (Termux)
  36. Nmap network scanning (Basic Tutorial for Beginers) – 002
  37. Nmap Port Scanning tool (Basic Tutorial for Beginers) – 001
  38. Penetration Testing and Ethical Hacking Linux Distribute – Kali Linux
Five Best Cyber Security and Ethical Hacking Private Degrees in Sri Lanka
Five Best Cyber Security and Ethical Hacking Private Degrees in Sri Lanka

What is cyber security?

Cyberspace means protecting data from computers, servers, mobile devices, electronic systems, networks, and malicious attacks. This is also known as information technology security or electronic information security. The term is applied in a wide variety of contexts from business to mobile computing and can be divided into a few general categories.

Network security is the ability to obtain computer networks from intruders, whether targeted by attackers or opportunistic malware.

Application security focuses on keeping software and devices away from threats. May provide access to data designed to protect compromised applications. Before running any program or device, successful protection begins at the design stage.

Security protects the integrity and privacy of data during data storage and transportation.

Operational security includes policies and decisions to manage and protect data assets. User permissions and policies when accessing the network determine how and where data can be stored or shared, all fall under this umbrella.

Disaster recovery and business continuity define how a company responds to a cybersecurity event or activity or any other event that causes data loss. Disaster recovery policies describe how the organization restores its operations and information to return to operational efficiency prior to the event. The continuation of the business is the plan for the company to return to work without some resources.

End-user education represents the most unexpected cyber-security factor: people. Failure to follow good security practices can inadvertently introduce a virus into an otherwise secure system. To protect any organization, users should remove suspicious email attachments, do not plug in unknown USB drives, and contain many other important texts.

BSc (Hons) in Information Technology Specialising in Cyber Security by sliit.lk

BSc (Hons) in Information Technology Specialising in Cyber Security by sliit.lk

This course is designed for students who want to pursue a fast-paced career in cyber / information security. It prepares you for a successful career in a variety of roles directly and indirectly related to the world of computer, network, and information security.

Official Website – www.sliit.lk

Duration : 4 Years
Entry : February / June / September
Location : Malabe / Colombo / Matara / Kandy
Examinations: Weekdays / Weekends

Contact:
PHONE: +94 11 754 4801
EMAIL: INFO@SLIIT.LK
ADDRESS: NEW KANDY ROAD, MALABE

Certificate in Cyber Security & Ethical Hacking by cicra.edu.lk

Certificate in Cyber Security & Ethical Hacking by cicra.edu.lk

The certificate indicates the importance of information and system security in cybersecurity and ethical hacking. This special program includes 56 hours of practice and end-program testing. Certified students in cybersecurity and ethical hacking gain knowledge and skills related to ethical hacking and cybersecurity and understand the importance of information and systems security and best practices in information management, disaster recovery, and overall understanding. Learn about the importance of information system security, including data security, database security, network security, and computer security, the concept of ethical hacking, and practical approaches to ethical hacking.

Official Website – cicra.edu.lk

Contact:
Email: info@cicra.lk
Phone: +94 11 259 6200
Phone: +94 11 255 6402
Fax: +94 71 880 0871
ADDRESS: No 1002, 8th Floor, Unity Plaza, Colombo 04, Sri Lanka.

MSc Cyber Security and Forensics by iit

MSc Cyber Security and Forensics by iit

The MSc is awarded by the University of Westminster, University of Cybersecurity and Forensics in the United Kingdom. This course is designed with the highest level of industry in mind. The course is based on nature. It offers high marketable computer security and digital forensics skills. Cybersecurity or IT security is the protection of information systems against theft or damage to hardware or software, information on them as well as the services they provide. Digital forensics is the identification, preservation, retrieval, analysis, and presentation of facts about digital evidence found on computers or digital storage media devices in connection with computer crimes.

All students take core modules, which are designed to give a comprehensive introduction to this particular field. This course covers basic digital forensics and network security and computer systems tools and Linux / Unix operating systems. It also deals with digital evidence in a professional manner (including following appropriate legal guidelines). Then you follow the path of cybersecurity or digital forensics in the course (although each leads to the same designated degree: there are opportunities to specialize in the route area). In addition, all students take the Research Methods module and complete the project module.

This course provides an opportunity to examine a wide variety of devices available in the open market and use forensic tools to retrieve data from electronic sources. It also examines the development of professional competencies, such as analyzing professional and ethical issues related to computer security and forensics, and writing reports and presenting evidence in court.

Official Website – iit.ac.lk

Duration: 2 Years

Contact:
ADDRESS: 57, Ramakrishna Road, Colombo 06, Sri Lanka.
Hotline: +94 112 360 212, +94 766 760 760

BSc (Hons) Cyber Security and Digital Forensics by esoft.lk

BSc (Hons) Cyber Security and Digital Forensics by esoft.lk

Kingston University’s cybersecurity and computer forensics degree program run through student employment. The course syllabus adjusts with many industry-recognized certifications; Examples are Certified Information System Security Professionals (CISSP) and Systems Security Certified Practitioner (SSCP) for Cyber ​​Security for Digital Forensics. Students are given a unique opportunity to practice industry-recognized certification exams at the appropriate time during degree studies and eventually to distinguish themselves professionally at an early stage in their future careers. With additional support from local career services, there is support for students to identify and pursue clear career opportunities. The ultimate goal of this course is to develop highly qualified cybersecurity and computer forensic graduates who are well-suited for appointments as skilled professionals in the industry.

Official Website – esoft.lk

Contact:
Email: info@esoft.lk
Phone: +94 11 7 555 550
Phone: +94 11 2 553 883
Phone: +94 77 309 9 301
Fax: +94 11 2 500 934
ADDRESS: No. 235, Galle Road, Colombo 4, Sri Lanka.

BSc (Hons) Cyber Security by apiit.lk

BSc (Hons) Cyber Security by apiit.lk

The BSC (Hans) Cyber ​​Security Award is designed to help you embark on your future career in software and hardware protection against malicious threats. Our curriculum is designed to provide you with not only a theoretical foundation in computer science but also practical and expert-level knowledge in a particular field ranging from network security to ethical hacking. After graduation, you will be fully ready to work in the industry.

We will focus more on the practical aspect of cybersecurity. The lab, equipped with the latest equipment and software, allows you to practice what you learn in the classroom while studying.

Official Website – apiit.lk

Contact:
Email: info@apiit.lk
Phone: +94 117 675 100
Phone: +94 112 687 249
ADDRESS: No. 388, Union Place, Colombo 2, Sri Lanka

If you want to add your institute to this list send us a mail or use our contact us page.

Tags: , , , , , , , , , , , , , ,
Thiwanga Sandaruwan is a professional blog writer. SecDevil.com is the main website of he managed. If you have any problem feel free and contact him.

Related Article

No Related Article

Leave a Reply

Your email address will not be published. Required fields are marked *

CommentLuv badge