Network Security

This training Program aims at imparting skills required to secure a Network from Internal and External Threats by understanding and analyzing the Vulnerabilities which exist in a Network. We cover building an appropriate Network Security Infrastructure required to Monitor and Secure a Network, wired or wireless by using the correct Hardware, Software and Penetration Testing - Ethical Hacking Infrastructure. We will be practically understanding various network based attacks, Intrusion Detection Systems, Intrusion Prevention Systems, Firewalls, Virtual LANs, Virtual Private Networks, Network Encryption, Wireless Network Security, DNS Tunneling and Network Forensics.

 

Types of Network Security Devices


  • Active Devices: These security devices block the surplus traffic. Firewalls, antivirus scanning devices, and content filtering devices are the examples of such devices.
  • Passive Devices - These devices identify and report on unwanted traffic, for example, intrusion detection appliances.
  • Preventative Devices - These devices scan the networks and identify potential security problems. For example, penetration testing devices and vulnerability assessment appliances.
  • Unified Threat Management (UTM) - These devices serve as all-in- one security devices. Examples include firewalls, content filtering, web caching, etc.

Syllabus for Ethical Hacking Course


  • Chapter 1 - Network Topology
  • Chapter 2 - Open Systems Interconnectivity Model
  • Chapter 3 - TCP/IP In-depth
  • Chapter 4 - WAP, NAT, DNS and ICMP
  • Chapter 5 - Internet Routing
  • Chapter 6 - Advanced Port Scanning
  • Chapter 7 - Sniffing Attacks
  • Chapter 8 - Masquerading Attacks
  • Chapter 9 - Advanced DOS and DDOS
  • Chapter 10 - Session Hijacking Attacks
  • Chapter 11 - Network Operations Center - Security
  • Chapter 12 - Network Traffic Analysis
  • Chapter 13 - Network Vulnerability Assessment
  • Chapter 14 - Network Penetration Testing
  • Chapter 15 - Intrusion Detection System
  • Chapter 16 - Snort 101
  • Chapter 17 - OSSEC 102
  • Chapter 18 - Intrusion Prevention System
  • Chapter 19 - Firewalls (Installation, Configuration and Usage)
  • Chapter 20 - OS Hardening for Networks - Linux and Windows
  • Chapter 21 - Cryptography - Introduction
  • Chapter 22 - Symmetric Key Encryption
  • Chapter 23 - Asymmetric Key Encryption
  • Chapter 24 - Hash functions
  • Chapter 25 - Trust models
  • Chapter 26 - VLAN - Security
  • Chapter 27 - VPN - Security
  • Chapter 28 - Wireless Networks - Introduction
  • Chapter 29 - Radio Frequency Essentials
  • Chapter 30 - Wireless Security - Basics
  • Chapter 31 - Wireless Threats
  • Chapter 32 - Attacking Wireless Hotspot and Security
  • Chapter 33 - WEP Security
  • Chapter 34 - WPA/WPA2 Security
  • Chapter 35 - Secure Wireless Infrastructure Deployment
  • Chapter 36 - DNS Tunneling
  • Chapter 37 - Network Forensic Methodology
  • Chapter 38 - Network Evidence Acquisition
  • Chapter 39 - OS Logs and Splunk
  • Chapter 40 - Summary
  • DURATION: 90HRs