Network Security Classroom Program

NETWORK SECURITY

Each organisation needs a safe and secure network in order to prevent hackers from stealing and misusing the data. This creates an urgent need for network security experts. Skilled professionals who can build and secure good network system. Our network security course is designed to train students to identify vulnerabilities, security concerns. They learn to anticipate attacks which helps to plan and implement the necessary Security solutions to network systems, application or server. The course module covers all critical topics such as Network topology, Open system Inter connectivity model or OSI, Protocol architecture, Nat Configuration, Advanced Port Scanning and so on.

Training Duration: 60 Hours

Pre-requisite: CISE Level 1.

Training Module: Download Training Module.

Inquiry Form

  • Chapter 1 – Network Topology
  • Chapter 2 – Open Systems Interconnectivity Model
  • Chapter 3 – TCP/IP In-depth
  • Chapter 4 – WAP, NAT, DNS and ICMP
  • Chapter 5 – Internet Routing
  • Chapter 6 – Advanced Port Scanning
  • Chapter 7 – Sniffing Attacks
  • Chapter 8 – Masquerading Attacks
  • Chapter 9 – Advanced DOS and DDOS
  • Chapter 10 – Session Hijacking Attacks
  • Chapter 11 – Network Operations Center – Security
  • Chapter 12 – Network Traffic Analysis
  • Chapter 13 – Network Vulnerability Assessment
  • Chapter 14 – Network Penetration Testing
  • Chapter 15 – Intrusion Detection System
  • Chapter 16 – Snort 101
  • Chapter 17 – OSSEC 102
  • Chapter 18 – Intrusion Prevention System
  • Chapter 19 – Firewalls (Installation, Configuration and Usage)
  • Chapter 20 – OS Hardening for Networks – Linux and Windows
  • Chapter 21 – Cryptography – Introduction
  • Chapter 22 – Symmetric Key Encryption
  • Chapter 23 – Asymmetric Key Encryption
  • Chapter 24 – Hash functions
  • Chapter 25 – Trust models
  • Chapter 26 – VLAN – Security
  • Chapter 27 – VPN – Security
  • Chapter 28 – Wireless Networks – Introduction
  • Chapter 29 – Radio Frequency Essentials
  • Chapter 30 – Wireless Security – Basics
  • Chapter 31 – Wireless Threats
  • Chapter 32 – Attacking Wireless Hotspot and Security
  • Chapter 33 – WEP Security
  • Chapter 34 – WPA/WPA2 Security
  • Chapter 35 – Secure Wireless Infrastructure Deployment
  • Chapter 36 – DNS Tunneling
  • Chapter 37 – Network Forensic Methodology
  • Chapter 38 – Network Evidence Acquisition
  • Chapter 39 – OS Logs and Splunk
  • Chapter 40 – Summary

View More
 

Our Partner