Mail :
India : +91-8143-111-555
USA : +1-703-445-4802
uk : +44-20-3287-2021
Whats app : +91-8143-110-555
Facebook Twitter Google Plus Pinit Stumbleupon Youtube Blog Blog

Workday HCM Demo New Batches Starting from Friday... 31-8-2018
Search Course Here

Live Chat
Security and Networks  Online Training

Security and Networks


Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.
  • Before attending this course delegates should have Comptia Network equivalent knowledge, however, it is not essential to have passed the Network exam.
  • Please be aware, delegates will be required to book on to the ECNSAEX exam code in order to sit the exam.
  • It is a 20 days program and extends up to 2hrs each.
  • The format is 40% theory, 60% Hands-on.

  • It is a 5 days program and extends up to 8hrs each.
  • The format is 40% theory, 60% Hands-on.
    Private Classroom arranged on request and minimum attendies for batch is 4.
course content
  • Introduction to Network Security
    • Network topology; Network Types and the OSI Model
  • Network Protocols
    • Network Protocols: SLIP; PPP; ARP; RARP; IGMP; ICMP; SNMP, HTTP
    • IP: Attacks and Countermeasures
    • TCP, UDP: Attacks and Countermeasures
    • FTP, TFTP, TELNET, SMTP: Vulnerabilities
  • Security Policy
    • What is Security Policy?
    • What Defines a good security policy
    • Security Policy Structure
    • Developing and Implementing security policies
    • Requirements of Effective Security Policy
  • Physical Security
    • Physical Security Threats
    • Locks and Keys
    • Fire Safety: Fire Suppression, Gaseous Emission Systems
    • Laptop Security: Physical Security Countermeasures
    • Biometric Devices
    • PC Security: Boot Access
  • Network Attacks
    • Current Statistics
    • Defining Terms: Threats, Attack and Exploit
    • Classification of Hackers and Attacks
    • Spoofing; Spamming; Eaves Dropping; Phishing; War Dialing; Password Cracking
    • Web Page Defacement; SQL Injection; Wire Tapping; Buffer Overflow
    • War Driving; War Chalking; War Flying
    • Denial of Service (DOS) Attacks and Distributed DOS
  • Intrusion Detection System
    • Characteristics of IDS
    • Host based IDS Vs Network based IDS
    • IDS Detection Methods; Types of Signatures
    • Intrusion Prevention System
    • IDS Vs IPS
    • IPS Tool
  • Firewalls
    • Handling threats and security tasks
    • Protection against hacking
    • Centralization and Documentation
    • Multi-layer firewall protection
    • Packet filtering and Stateful Packet Filtering
    • Multi firewall DMZ
    • Specialty firewalls and Reverse firewalls
  • Packet Filtering and Proxy Servers
    • Network Address Translation
    • Application layer gateway and Proxying
    • Virtual Private Network and the Authentication process
  • Bastion Host and Honeypots
    • Bastion Host
    • Honeypots and Honeynet
  • Hardening Routers
    • Internet work Operating Systems (IOS)
    • Troubleshooting a router
    • Hardening a Router
    • Components of router security
    • Router security: testing tools
  • Hardening Operating Systems Security
    • Windows Security
    • Objects And Permissions
    • NTFS File System Permissions
    • Active Directory
    • Kerberos Authentication And Security
    • IP Security
    • Linux
  • Patch Management
    • Red Hat Up2date Patch Management Utility Installation Steps
    • Microsoft Patch Management Process and Windows Update Services
    • Patch Management Tools: Qchain
    • Patch Management Tool: Microsoft Baseline Security Analyzer
    • Other Patch Management Tools
  • Application Security
    • Securing Web Applications
    • IPSec And SSL Security
    • Writing Secure Code; Best Practices
    • Remote Administration Security
  • Web Security
    • Network Devices and Design
    • Altering the Network Addresses
    • Client Authorization and Secure Client Transmissions
    • Portable Applications
    • Malicious Code Detection
    • Browser Security Settings
    • Common Gateway Interface (CGI)
    • Web Application Input Data Validation and Buffer Overflows
  • E-Mail Security
    • Components Of An Email
    • E-mail protocols
    • E-Mail Security Risks
    • How to defend against E-Mail security risks
  • Encryption
    • Firewalls Implementing Encryption
    • Maintaining confidentiality
    • Digital certificates
    • Public and Private Keys (including PGP)
    • Choosing the size of keys
    • Analyzing popular encryption schemes including IPSEC
  • Virtual Private Networks
    • VPN Tunneling Protocols
    • PPTP and L2TP
    • VPN Security
  • WLAN
    • Wireless Network Types
    • Antenna
    • WLAN Standards
    • BlueTooth And Ultra Wideband
    • WEP Description Tool (Air Snort and WEPCrack)
    • WLAN Security;WPA; TKIP; WTLS
    • EAP Methods
    • Advanced Encryption Standards (AES); DES; RSA Encryption
    • RADIUS; Multifactor Authentication
    • Mobile Security Through Certificates
    • Certificate Management Through PKI
  • Creating Fault Tolerance
    • Network Security: Fault Tolerance
    • Why Create Fault Tolerance
    • Planning For Fault Tolerance
    • Reasons For System Failure
    • Preventive Measures
  • Incident Response
    • What Is an Incident
    • Step by Step Procedure
    • Managing Incidents
    • What Is an Incident Response
    • Six Step Approach for Incident Handling (PICERF Methodology)
    • Incident Response Team
  • Disaster Recovery and Planning
    • What is a Disaster Recovery
    • Disaster Recovery Planning
    • Business Continuity Planning Process
    • Disaster Prevention
  • Network Vulnerability Assessment
    • Vulnerability Assessment
    • Goals of vulnerability assessment
    • Network vulnerability Assessment methodology:
    • Selecting vulnerability assessment tools
Security and Networks videos will be updated soon
To Watch More Videos Click Here

Flash News

AngularJS New Batch Starting From 28th August & 29th August.

Hadoop Dev New Batch Starting From 28th August & 29th August.

IBM COGNOS TM New Batch Starting From 28th August & 29th August.

Informatica Dev New Batch Starting From 28th August & 29th August.

Mean Stack New Batch Starting From 28th August & 29th August.

SAP BODS new Batch Starting From 28th August & 29th August.

SAP S/4 HANA New Batch Starting From 28th August & 29th August.

Tableau New Batch Starting From 28th August & 29th August.


(1) Workday Technical Demo Training

Demo Schedule : 09:30 P.M EST / 08:30 P.M CST / 6:30 P.M PST on 23th August & 07:00 A.M IST on 24th August

Email :
Rediff Bol :
Google Talk :
MSN Messenger :
Yahoo Messenger :
Skype Talk :