India: +91 406677 1418

WhatsApp no. : +919100386313

USA: +1 909 233 6006

Telegram : +15168586242

Security and Networks-online-training

Security and Networks Online Training Course Content

Introduction to Network Security
  • Network topology & Types
  • OSI Model
Network Protocols
  • Network Protocols: SLIP; PPP; ARP; RARP; IGMP; ICMP; SNMP, HTTP
  • Attacks & Countermeasures : TCP, UDP
  • Vulnerabilities : FTP, TFTP, TELNET, SMTP
Security Policy
  • Security Policy Structure
  • Developing & Implementing security policies
  • Effective Security Policy
Physical Security
  • Locks & Keys
  • The TEMPEST
  • Fire Safety
  • Laptop Security
  • Biometric Devices
  • PC Security
Network Attacks
  • Current Statistics
  • DThreats, Attack & Exploit
  • Hackers & Attacks
  • Denial of Service (DOS) Attacks & Distributed DOS
Intrusion Detection System
  • Host based IDS & Network based IDS
  • IDS Detection Methods
  • Intrusion Prevention System
  • IPS Tool
Firewalls
  • Handling threats & security tasks
  • Centralization &  Documentation
  • Multi-layer firewall protection
  • Packet filtering & Stateful Packet Filtering
  • Multi firewall DMZ
  • Specialty firewalls & Reverse firewalls
Packet Filtering & Proxy Servers
  • The Network Address Translation
  • Application layer gateway & Proxying
  • Virtual Private Network & Authentication process
Bastion Host & Honeypots
  • Hardening Routers
  • Operating Systems (IOS)
  • Troubleshooting
  • Components of router security
  • Router security
Hardening Operating Systems Security
  • Windows Security
  • Objects & Permissions
  • The NTFS File System Permissions
  • The Active Directory
  • Kerberos Authentication & Security
  • IP Security
  • Linux
Patch Management
  • Microsoft Patch Management Process & Windows Update Services
  • Patch Management Tools
Application Security
  • Securing Web Applications
  • IPSec & SSL Security
  • Writing Secure Code
  • Remote Administration Security
Web Security
  • Network Devices & Design
  • Altering the Network Addresses
  • Client Authorization & Secure Client Transmissions
  • The Portable Applications
  • Malicious Code Detection
  • Common Gateway Interface
  • Web Application Input Data Validation & Buffer Overflows
Encryption
  • Firewalls Implementing Encryption
  • Maintaining confidentiality
  • Digital certificates
  • Public and Private Keys (including PGP)
  • Choosing the size of keys
  • Analyzing popular encryption schemes including IPSEC
Virtual Private Networks
  • VPN Tunneling Protocols
  • PPTP and L2TP
  • VPN Security
WLAN
  • Wireless Network Types
  • Antenna
  • WLAN Standards
  • BlueTooth And Ultra Wideband
  • WEP Description Tool (Air Snort and WEPCrack)
  • WLAN Security;WPA; TKIP; WTLS
  • EAP Methods
  • Advanced Encryption Standards (AES); DES; RSA Encryption
  • RADIUS; Multifactor Authentication
  • Mobile Security Through Certificates
  • Certificate Management Through PKI
Creating Fault Tolerance
  • Network Security: Fault Tolerance
  • Why Create Fault Tolerance
  • Planning For Fault Tolerance
  • Reasons For System Failure
  • Preventive Measures
Incident Response
  • What Is an Incident
  • Step by Step Procedure
  • Managing Incidents
  • What Is an Incident Response
  • Six Step Approach for Incident Handling (PICERF Methodology)
  • Incident Response Team
Disaster Recovery and Planning
  • What is a Disaster Recovery
  • Disaster Recovery Planning
  • Business Continuity Planning Process
  • Disaster Prevention