Cyber Security Trainers

Cyber Security

Cyber Security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term Security implies Cyber Security.

Unit 1: Security Concepts and Mechanisms 
    Module I: Networking Concepts Overview 
        1: Basics of Communication Systems 
        2: Transmission Media 
        3: ISO/OSI and TCP/IP Protocol Stacks 
        4: Local Area Networks 
        5: Wide Area Networks 
        6 : Internetworking 
        7 : Packet Formats 
        8 : Wireless Networks 
        9 : The Internet 
     Module 2: Information Security Concepts 
        1 : Information Security Overview 
        2 : Information Security Services 
        3 : Types of Attacks 
        4 : Goals for Security 
        5 : E-commerce Security 
        6 : Computer Forensics 
        7 : Steganography 
        8 : Security Engineering 
     Module 3: Security Threats and vulnerabilities 
        1 : Overview of Security threats 
        2 : Hacking Techniques 
        3 : Password Cracking 
        4 : Insecure Network connections 
        5 : Malicious Code 
        6 : Programming Bugs 
        7 : Cyber crime and Cyber terrorism 
        8 : Information Warfare and Surveillance 
    Module 4: Cryptography 
        1 : Introduction to Cryptography 
        2 : Symmetric key Cryptography 
        3 : Asymmetric key Cryptography 
        4 : Message Authentication and Hash functions 
        5 : Digital Signatures 
        6 : Public Key infrastructure 
        7 : Diffe-Hellman key exchange proptocol 
        8 : Applications of Cryptography 

Unit 2: Security Management 
    ModuleI: Security Management Practices 
        1: Overview of Security Management 
        2: Information Classification Process 
        3: Security Policy 
        4: Risk Management 
        5: Security Procedures and Guidelines 
        6: Business Continuity and Disa ster Recovery 
    Module2: Security Laws and Standards 
        1: Security Assurance 
        2: Security Laws 
        3: International Standards 
        4: Security Audit 
        5: OCTAVE approach 
        6: SSE-CMM Unit 3:


Unit 3: Network Security 
    Module 1: Access Control and Intrusion Detection 
        1: Overview of Identification and Authorization 
        2: I & A Techniques 
        3: Overview of IDS 
        4: Intrusion Detection Systems and Intrusion Prevention Systems 
    Module 2: Server Management and Firewalls 
        1: User Management 
        2: DNS Routing and Load Balancing 
        3: Overview of Firewalls 
        4: Types of Firewalls 
        5: DMZ and firewall features 
    Module 3: Security for VPN and Next Generation Networks 
        1: VPN Security 
        2: Security in Multimedia Networks 
        3: Fax Security 
        4: Link Encryption Devices 

Unit 4: System and Application Security
    Module 1: Security Architectures and Models 
        1:Desiging Secure Operating Systems 
        2: Controls to enforce security services 
        3: Information flow model and Biba model 
    Module 2: System Security 
        1: Desktop Security 
        2: email security: PGP and SMIME 
        3: Web Security: web authentication, SSL and SET 
    Module 3: OS Security 
        1: OS Security Vulnerabilities, updates and patches 
        2: OS integrity checks 
        3: Anti-virus software 
        4: Design of secure OS and OS hardening 
        5: Configuring the OS for security  6: Trusted OS
 

Quick Enroll