Diploma in Network Security - Classroom Program

Diploma in Network Security

Network security specialists need to develop the competencies that are required top maintain the overall network architecture and prevent any unwarranted penetration attempts. With our Classroom program for Diploma in Network Security students learn about the design and how to write computer programs, use and maintain databases, configure and integrate various network security tools and install and secure computer networks. They also learn to run identify the vulnerabilities, devise contingencies and maintain the network security. The extensive classroom sessions conducted by our certified and experienced trainers teach the students to develop essential knowledge & skills and tools to employ cyber security measures and protect the data in accordance to the network security industry standards and regulations.

Training Duration: 60 Hours

Pre-requisite: CISE Level 1

Inquiry Form

  • Chapter 1 – Network Topology
  • Chapter 2 – Open Systems Interconnectivity Model
  • Chapter 3 – TCP/IP In-depth
  • Chapter 4 – WAP, NAT, DNS and ICMP
  • Chapter 5 – Internet Routing
  • Chapter 6 – Advanced Port Scanning
  • Chapter 7 – Sniffing Attacks
  • Chapter 8 – Masquerading Attacks
  • Chapter 9 – Advanced DOS and DDOS
  • Chapter 10 – Session Hijacking Attacks
  • Chapter 11 – Network Operations Center – Security
  • Chapter 12 – Network Traffic Analysis
  • Chapter 13 – Network Vulnerability Assessment
  • Chapter 14 – Network Penetration Testing
  • Chapter 15 – Intrusion Detection System
  • Chapter 16 – Snort 101
  • Chapter 17 – OSSEC 102
  • Chapter 18 – Intrusion Prevention System
  • Chapter 19 – Firewalls (Installation, Configuration and Usage)
  • Chapter 20 – OS Hardening for Networks – Linux and Windows
  • Chapter 21 – Cryptography – Introduction
  • Chapter 22 – Symmetric Key Encryption
  • Chapter 23 – Asymmetric Key Encryption
  • Chapter 24 – Hash functions
  • Chapter 25 – Trust models
  • Chapter 26 – VLAN – Security
  • Chapter 27 – VPN – Security
  • Chapter 28 – Wireless Networks – Introduction
  • Chapter 29 – Radio Frequency Essentials
  • Chapter 30 – Wireless Security – Basics
  • Chapter 31 – Wireless Threats
  • Chapter 32 – Attacking Wireless Hotspot and Security
  • Chapter 33 – WEP Security
  • Chapter 34 – WPA/WPA2 Security
  • Chapter 35 – Secure Wireless Infrastructure Deployment
  • Chapter 36 – DNS Tunneling
  • Chapter 37 – Network Forensic Methodology
  • Chapter 38 – Network Evidence Acquisition
  • Chapter 39 – OS Logs and Splunk
  • Chapter 40 – Summary

View More
 

Our Partner