Web Application Security Classroom Program

WEB APPLICATION SECURITY

Web applications have been popular than ever. Although these applications have made many processes swift and easier, the quantity and importance of data entrusted to these web applications is also growing. The security specialists need to learn and secure the applications from any unwarranted attacks. Conventional network defenses, such as firewalls have become insufficient to secure web applications today and need skilled experts who can identify, analyze and rectify vulnerabilities in a web application security. The groundbreaking classroom sessions at Innobuzz for the Diploma in Web Application Security Course encourage students to strategise theor plan of defense and come up with new approaches to handle a security issue.

Training Duration: 60 Hours

Pre-requisite: CISE Level 1.

Training Module: Download Training Module.

Inquiry Form

  • Chapter 1 – Network Topology
  • Chapter 2 – Open Systems Interconnectivity Model
  • Chapter 3 – TCP/IP In-depth
  • Chapter 4 – WAP, NAT, DNS and ICMP
  • Chapter 5 – Internet Routing
  • Chapter 6 – Advanced Port Scanning
  • Chapter 7 – Sniffing Attacks
  • Chapter 8 – Masquerading Attacks
  • Chapter 9 – Advanced DOS and DDOS
  • Chapter 10 – Session Hijacking Attacks
  • Chapter 11 – Network Operations Center – Security
  • Chapter 12 – Network Traffic Analysis
  • Chapter 13 – Network Vulnerability Assessment
  • Chapter 14 – Network Penetration Testing
  • Chapter 15 – Intrusion Detection System
  • Chapter 16 – Snort 101
  • Chapter 17 – OSSEC 102
  • Chapter 18 – Intrusion Prevention System
  • Chapter 19 – Firewalls (Installation, Configuration and Usage)
  • Chapter 20 – OS Hardening for Networks – Linux and Windows
  • Chapter 21 – Cryptography – Introduction
  • Chapter 22 – Symmetric Key Encryption
  • Chapter 23 – Asymmetric Key Encryption
  • Chapter 24 – Hash functions
  • Chapter 25 – Trust models
  • Chapter 26 – VLAN – Security
  • Chapter 27 – VPN – Security
  • Chapter 28 – Wireless Networks – Introduction
  • Chapter 29 – Radio Frequency Essentials
  • Chapter 30 – Wireless Security – Basics
  • Chapter 31 – Wireless Threats
  • Chapter 32 – Attacking Wireless Hotspot and Security
  • Chapter 33 – WEP Security
  • Chapter 34 – WPA/WPA2 Security
  • Chapter 35 – Secure Wireless Infrastructure Deployment
  • Chapter 36 – DNS Tunneling
  • Chapter 37 – Network Forensic Methodology
  • Chapter 38 – Network Evidence Acquisition
  • Chapter 39 – OS Logs and Splunk
  • Chapter 40 – Summary

View More
 

Our Partner