IT COURSES

Computer & Network Security

Certified Training Course.

Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.

Computer Network Security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.

 COURSE OUTLINE 

 

Computer Network Fundamentals

  • 1.2 Computer Network Models

  • 1.3 Computer Network Types

  • 1.4 Data Communication Media Technology

  • 1.5 Network Topology

  • 1.6 Network Connectivity and Protocols

  • 1.7 Network Services

  • 1.8 Network Connecting Devices

  • 1.9 Network Technologies

 

Understanding Computer Network Security

  • 2.2 Securing the Computer Network

  • 2.3 Forms of Protection

  • 2.4 Security Standards

 

Security Threats to Computer Networks

  • 3.2 Sources of Security Threats

  • 3.3 Security Threat Motives

  • 3.4 Security Threat Management

  • 3.5 Security Threat Correlation

  • 3.6 Security Threat Awareness

 

Computer Network Vulnerabilities

  • 4.2 Sources of Vulnerabilities

  • 4.3 Vulnerability Assessment

 

Cyber Crimes and Hackers

  • 5.2 Cyber Crimes

  • 5.3 Hackers

  • 5.4 Dealing with the Rising Tide of Cyber Crimes

 

Hostile Scripts

  • 6.2 Introduction to the Common Gateway Interface

  • 6.3 CGI Scripts in a Three-Way Handshake

  • 6.4 Server: CGI Interface

  • 6.5 CGI Script Security Issues

  • 6.6 Web Script Security Issues

  • 6.7 Dealing with the Script Security Problems

  • 6.8 Scripting Languages

 

Security Assessment, Analysis, and Assurance

  • 7.2 System Security Policy

  • 7.3 Building a Security Policy

  • 7.4 Security Requirements Specification

  • 7.5 Threat Identification

  • 7.6 Threat Analysis

  • 7.7 Vulnerability Identification and Assessment

  • 7.8 Security Certification

  • 7.9 Security Monitoring and Auditing

  • 7.10 Products and Services

 

Disaster Management

  • 8.2 Disaster Prevention

  • 8.3 Disaster Response

  • 8.4 Disaster Recovery

  • 8.5 Make Your Business Disaster Ready

  • 8.6 Resources for Disaster Planning and Recovery

 

Access Control and Authorization

  • 9.2 Access Rights

  • 9.3 Access Control Systems

  • 9.4 Authorization

  • 9.5 Types of Authorization Systems

  • 9.6 Authorization Principles

  • 9.7 Authorization Granularity

  • 9.8 Web Access and Authorization

 

Authentication

  • 10.2 Multiple Factors and Effectiveness of Authentication

  • 10.3 Authentication Elements

  • 10.4 Types of Authentication

  • 10.5 Authentication Methods

  • 10.6 Developing an Authentication Policy

 

Cryptography

  • 11.2 Symmetric Encryption

  • 11.3 Public-Key Encryption

  • 11.4 Enhancing Security: Combining Symmetric

  • 11.5 Key Management: Generation, Transportation, & Distribution

  • 11.6 Public-Key Infrastructure

  • 11.7 Lightweight Directory Access Protocols (LDAP)

  • 11.8 Role of Cryptography in Communication

  • 11.9 Hash Function

  • 11.10 Digital Signatures

 

Firewalls

  • 12.2 Types of Firewalls

  • 12.3 Configuration and Implementation of a Firewall

  • 12.4 The Demilitarized Zone

  • 12.5 Improving Security Through the Firewall

  • 12.6 Firewall Forensics

  • 12.7 Firewall Services and Limitations

View more information.

  • Enroll & become certified, Enhance your career with the certification and your learnings.

  • Our courses are flexible with no time plan.

  • Our classes are available online or face-to-face. with flexible timing scheduling.

  • You must complete the training & Exam to achieve the certification.

  • To get a quote on our courses, you can contact us on 8004852

Best results guaranteed!