Experience:13+ Years
In this Introduction to Cyber Security training course, you will gain a comprehensive overview of the cybersecurity principles and concepts and learn the challenges of designing a security program. This course helps you develop and manage an Information Security Program, perform business impact analysis, and carry out disaster recovery testing.
Introduction
♦ Networking Concepts Overview
♦ Basics of Communication Systems
♦ Transmission Media
♦ ISO/OSI and TCP/IP Protocol Stacks
♦ Local Area Networks
♦ Wide Area Networks
♦ Internetworking
♦ Packet Formats
♦ Wireless Networks
♦ The Internet
Information Security Concepts
♦ Information Security Overview
♦ Information Security Services
♦ Types of Attacks
♦ Goals for Security
♦ E-commerce Security
♦ Computer Forensics
♦ Steganography
♦ Security Engineering
Security Threats and vulnerabilities
♦ Overview of Security threats
♦ Hacking Techniques
♦ Password Cracking
♦ Insecure Network connections
♦ Malicious Code
♦ Programming Bugs
♦ Cyber crime and Cyber terrorism
♦ Information Warfare and Surveillance
Cryptography
♦ Introduction to Cryptography
♦ Symmetric key Cryptography
♦ Asymmetric key Cryptography
♦ Message Authentication and Hash functions
♦ Digital Signatures
♦ Public Key infrastructure
♦ Diffe-Hellman key exchange proptocol
♦ Applications of Cryptography
Security Management
Security Management Practices
♦ Overview of Security Management
♦ Information Classification Process
♦ Security Policy
♦ Risk Management
♦ Security Procedures and Guidelines
♦ Business Continuity and Disa ster Recovery
Security Laws and Standards
♦ Security Assurance
♦ Security Laws
♦ International Standards
♦ Security Audit
♦ OCTAVE approach
♦ SSE-CMM
Network Security
♦ Access Control and Intrusion Detection
♦ Overview of Identification and Authorization
♦ I & A Techniques
♦ Overview of IDS
♦ Intrusion Detection Systems and Intrusion Prevention Systems
Server Management and Firewalls
♦ User Management
♦ DNS Routing and Load Balancing
♦ Overview of Firewalls
♦ Types of Firewalls
♦ DMZ and firewall features
Security for VPN and Next Generation Networks
♦ VPN Security
♦ Security in Multimedia Networks
♦ Fax Security
♦ Link Encryption Devices
System and Application Security
Security Architectures and Models
♦ Desiging Secure Operating Systems
♦ Controls to enforce security services
♦ Information flow model and Biba model
System Security
♦ Desktop Security
♦ email security: PGP and SMIME
♦ Web Security: web authentication, SSL and SET
OS Security
♦ OS Security Vulnerabilities, updates and patches
♦ OS integrity checks
♦ Anti-virus software
♦ Design of secure OS and OS hardening
♦ Configuring the OS for security
We can assure a 100% job guarantee and Placement. Contact us for Free - Demo.
Copyright © 2017 - Developed by Infihive Consulting Services LLC changes