This event is now over

Event Details

About

 Security and Networks Online Training in Hyderabad india:Ecorptrainings Offers  Security and Networks  Course Training From India.. 

Course Contents 
Introduction to Network Security
Network topology; Network Types and the OSI Model
Network Protocols
Network Protocols: SLIP; PPP; ARP; RARP; IGMP; ICMP; SNMP, HTTP
IP: Attacks and Countermeasures
TCP, UDP: Attacks and Countermeasures
FTP, TFTP, TELNET, SMTP: Vulnerabilities
Security Policy
What is Security Policy?
What Defines a good security policy
Security Policy Structure
Developing and Implementing security policies
Requirements of Effective Security Policy
Physical Security
Physical Security Threats
Locks and Keys
TEMPEST
Fire Safety: Fire Suppression, Gaseous Emission Systems
Laptop Security: Physical Security Countermeasures
Biometric Devices
PC Security: Boot Access
Network Attacks
Current Statistics
Defining Terms: Threats, Attack and Exploit
Classification of Hackers and Attacks
Spoofing; Spamming; Eaves Dropping; Phishing; War Dialing; Password Cracking
Web Page Defacement; SQL Injection; Wire Tapping; Buffer Overflow
War Driving; War Chalking; War Flying
Denial of Service (DOS) Attacks and Distributed DOS
Intrusion Detection System
Characteristics of IDS
Host based IDS Vs Network based IDS
IDS Detection Methods; Types of Signatures
Intrusion Prevention System
IDS Vs IPS
IPS Tool
Firewalls
Handling threats and security tasks
Protection against hacking
Centralization and Documentation
Multi-layer firewall protection
Packet filtering and Stateful Packet Filtering
Multi firewall DMZ
Specialty firewalls and Reverse firewalls
Packet Filtering and Proxy Servers
Network Address Translation
Application layer gateway and Proxying
Virtual Private Network and the Authentication process
Bastion Host and Honeypots
Bastion Host
Honeypots and Honeynet
Hardening Routers
Internet work Operating Systems (IOS)
Troubleshooting a router
Hardening a Router
Components of router security
Router security: testing tools
Hardening Operating Systems Security
Windows Security
Objects And Permissions
NTFS File System Permissions
Active Directory
Kerberos Authentication And Security
IP Security
Linux
Patch Management
Red Hat Up2date Patch Management Utility Installation Steps
Microsoft Patch Management Process and Windows Update Services
Patch Management Tools: Qchain
Patch Management Tool: Microsoft Baseline Security Analyzer
Other Patch Management Tools
Application Security
Securing Web Applications
IPSec And SSL Security
Writing Secure Code; Best Practices
Remote Administration Security
Web Security
Network Devices and Design
Altering the Network Addresses
Client Authorization and Secure Client Transmissions
Portable Applications
Malicious Code Detection
Browser Security Settings
Common Gateway Interface (CGI)
Web Application Input Data Validation and Buffer Overflows
E-Mail Security
Components Of An Email
E-mail protocols
E-Mail Security Risks
How to defend against E-Mail security risks
Encryption
Firewalls Implementing Encryption
Maintaining confidentiality
Digital certificates
Public and Private Keys (including PGP)
Choosing the size of keys
Analyzing popular encryption schemes including IPSEC
Virtual Private Networks
VPN Tunneling Protocols
PPTP and L2TP
VPN Security
WLAN
Wireless Network Types
Antenna
WLAN Standards
BlueTooth And Ultra Wideband
WEP Description Tool (Air Snort and WEPCrack)
WLAN Security;WPA; TKIP; WTLS
EAP Methods
Advanced Encryption Standards (AES); DES; RSA Encryption
RADIUS; Multifactor Authentication
Mobile Security Through Certificates
Certificate Management Through PKI
Creating Fault Tolerance
Network Security: Fault Tolerance
Why Create Fault Tolerance
Planning For Fault Tolerance
Reasons For System Failure
Preventive Measures
Incident Response
What Is an Incident
Step by Step Procedure
Managing Incidents
What Is an Incident Response
Six Step Approach for Incident Handling (PICERF Methodology)
Incident Response Team
Disaster Recovery and Planning
What is a Disaster Recovery
Disaster Recovery Planning
Business Continuity Planning Process
Disaster Prevention
Network Vulnerability Assessment
Vulnerability Assessment
Goals of vulnerability assessment
Network vulnerability Assessment methodology:
Selecting vulnerability assessment tools
Ecorp Trainings, one of the best institute providing quality level of training in E-learning & Corporate Services.
We offer instructor led online training. Classroom trainings are conducted in Hyderabad , India.

We provide training for almost all IT technologies,i.e : Documentum, SAP , ORACLE , JAVA , DOTNET , STORAGE products , 

HYPERION etc.
for more details please visit- www.ecorptrainings.com

With Best Regards,
ECORP TRAININGS. 
Training Coordinator.

UK :+44-203-468-0685
USA : +1-703-445-4802 
INDIA: +91-8143111555 ; +91-40-64643304 / 06

URL : www.ecorptrainings.com 
Email : training@ecorptrainings.com


Contact

Ecorp Trainings, one of the best institute providing quality level of training in E-learning & Corporate Services.
We offer instructor led online training. Classroom trainings are conducted in Hyderabad , India.

We provide training for almost all IT technologies,i.e : Documentum, SAP , ORACLE , JAVA , DOTNET , STORAGE products ,

HYPERION etc.
for more details please visit- www.ecorptrainings.com

With Best Regards,
ECORP TRAININGS.
Training Coordinator.

UK :+44-203-468-0685
USA : +1-703-445-4802
INDIA: +91-8143111555 ; +91-40-64643304 / 06

URL : www.ecorptrainings.com
Email : training@ecorptrainings.com


www.ecorptrainings.com/

Schedule

November 16, 2013 — 9:00 am to
February 16, 2018 — 6:00 pm

Add to your calendar

Venue

ECORP TRAININGS