NETWORK SECURITY

This training Program aims at imparting skills required to secure a Network from Internal and External Threats by understanding and analyzing the Vulnerabilities which exist in a Network. We cover building an appropriate Network Security Infrastructure required to Monitor and Secure a Network, wired or wireless by using the correct Hardware, Software, and Penetration Testing – Ethical Hacking Infrastructure. We will be practically understanding various network-based attacks, Intrusion Detection Systems, Intrusion Prevention Systems, Firewalls, Virtual LANs, Virtual Private Networks, Network Encryption, Wireless Network Security, DNS Tunneling and Network Forensics.

Computer networks that are involved in regular transactions and communication within the government, individuals, or business require security. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

Chapter 1 - Network Topology
Chapter 2 - Open Systems Interconnectivity Model
Chapter 3 - TCP/IP In-depth
Chapter 4 - WAP, NAT, DNS and ICMP
Chapter 5 - Internet Routing
Chapter 6 - Advanced Port Scanning
Chapter 7 - Sniffing Attacks
Chapter 8 - Masquerading Attacks
Chapter 9 - Advanced DOS and DDOS
Chapter 10 - Session Hijacking Attacks
Chapter 11 - Network Operations Center -Security
Chapter 12 - Network Traffic Analysis
Chapter 13 - Network Vulnerability Assessment
Chapter 14 - Network Penetration Testing
Chapter 15 - Intrusion Detection System
Chapter 16 - Solar winds
Chapter 17 - Glasswire
Chapter 18 - Intrusion Prevention System
Chapter 19 - Firewalls (Installation,Configuration and Usage)
Chapter 20 - OS Hardening for Networks -Windows
Chapter 21 - Cryptography - Introduction
Chapter 22 - Symmetric Key Encryption
Chapter 23 - Asymmetric Key Encryption
Chapter 24 - Hash functions
Chapter 25 - Trust models
Chapter 26 - VLAN - Security
Chapter 27 - VPN – Security
Chapter 28 - Wireless Networks - Introduction
Chapter 29 - Radio Frequency Essentials
Chapter 30 - Wireless Security – Basics
Chapter 31 - Wireless Threats
Chapter 32 - Attacking Wireless Hotspot andSecurity
Chapter 33 - WEP Security
Chapter 34 - WPA/WPA2 Security
Chapter 35 - Secure Wireless Infrastructure Deployment
Chapter 36 - DNS Tunneling
DURATION: 90HRs

GET GUIDANCE FROM EXPERT COUNSELORS


Get Guidance from Expert Counselors
close slider