Hksglobal 

CUSTOMER CARE: 0913 665 6661

NETWORK SECURITY EXPERT

This training Program aims at imparting skills required to secure a Network from Internal and External Threats by understanding and analyzing the Vulnerabilities which exist in a Network. We cover building an appropriate Network Security Infrastructure required to Monitor and Secure a Network, wired or wireless by using the correct Hardware, Software and Penetration Testing - Ethical Hacking Infrastructure. We will be practically understanding various network based attacks, Intrusion Detection Systems, Intrusion Prevention Systems, Firewalls, Virtual LANs, Virtual Private Networks, Network Encryption, Wireless Network Security, DNS Tunneling and Network Forensics.


Training Duration: 60 Hours Eligibility: ISE Level 1.

MODULES:

Chapter 1 - Network Topology 

Chapter 2 - Open Systems Interconnectivity Model 

Chapter 3 - TCP/IP In-depth 

Chapter 4 - WAP, NAT, DNS and ICMP 

Chapter 5 - Internet Routing 

Chapter 6 - Advanced Port Scanning 

Chapter 7 - Sniffing Attacks 

Chapter 8 - Masquerading Attacks 

Chapter 9 - Advanced DOS and DDOS 

Chapter 10 - Session Hijacking Attacks 

Chapter 11 - Network Operations Center - Security 

Chapter 12 - Network Traffic Analysis 

Chapter 13 - Network Vulnerability Assessment 

Chapter 14 - Network Penetration Testing 

Chapter 15 - Intrusion Detection System 

Chapter 16 - Snort 101 

Chapter 17 - OSSEC 102 

Chapter 18 - Intrusion Prevention System 

Chapter 19 - Firewalls (Installation, Configuration and Usage) Chapter 20 - OS Hardening for Networks - Linux and Windows 

Chapter 21 - Cryptography - Introduction

Chapter 22 - Symmetric Key Encryption 

Chapter 23 - Asymmetric Key Encryption 

Chapter 24 - Hash functions 

Chapter 25 - Trust models 

Chapter 26 - VLAN - Security 

Chapter 27 - VPN - Security 

Chapter 28 - Wireless Networks - Introduction 

Chapter 29 - Radio Frequency Essentials 

Chapter 30 - Wireless Security - Basics 

Chapter 31 - Wireless Threats 

Chapter 32 - Attacking Wireless Hotspot and Security 

Chapter 33 - WEP Security 

Chapter 34 - WPA/WPA2 Security 

Chapter 35 - Secure Wireless Infrastructure Deployment 

Chapter 36 - DNS Tunneling 

Chapter 37 - Network Forensic Methodology 

Chapter 38 - Network Evidence Acquisition 

Chapter 39 - OS Logs and Splunk 

Chapter 40 - Summary