Nothing Special   »   [go: up one dir, main page]

CISE Level - 2 - Network Security L2v2

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

Course Name: CISE Level 2 (Network Security)

Background: This training Program aims at imparting skills required to secure a Network from Internal and External
Threats by understanding and analyzing the Vulnerabilities which exist in a Network. We cover building an appropriate
Network Security Infrastructure required to Monitor and Secure a Network, wired or wireless by using the correct
Hardware, Software and Penetration Testing - Ethical Hacking Infrastructure. We will be practically understanding various
network based attacks, Intrusion Detection Systems, Intrusion Prevention Systems, Firewalls, Virtual LANs, Virtual Private
Networks, Network Encryption, Wireless Network Security, DNS Tunneling and Network Forensics.
Training Duration: 40 Hours
Training Fee: Rs.21500 (Online Examination Cost, Digital Certificate, Books, Service Tax Included)
Pre-requisite: CISE Level 1

Training Module: Level 2
Chapter 1 - Network Topology Chapter 26 - VLAN - Security
Chapter 2 - Open Systems Interconnectivity Model Chapter 27 - VPN - Security
Chapter 3 - TCP/IP In-depth Chapter 28 - Wireless Networks - Introduction
Chapter 4 - WAP, NAT, DNS and ICMP Chapter 29 - Radio Frequency Essentials
Chapter 5 - Internet Routing Chapter 30 - Wireless Security - Basics
Chapter 6 - Advanced Port Scanning Chapter 31 - Wireless Threats
Chapter 7 - Sniffing Attacks Chapter 32 - Attacking Wireless Hotspot and
Chapter 8 - Masquerading Attacks Security
Chapter 9 - Advanced DOS and DDOS Chapter 33 - WEP Security
Chapter 10 - Session Hijacking Attacks Chapter 34 - WPA/WPA2 Security
Chapter 11 - Network Operations Center Security Chapter 35 - Secure Wireless Infrastructure
Chapter 12 - Network Traffic Analysis Deployment
Chapter 13 - Network Vulnerability Assessment Chapter 36 - DNS Tunneling
Chapter 14 - Network Penetration Testing Chapter 37 - Network Toolbox - Nmap, Nessus,
Chapter 15 - Intrusion Detection System Wireshark, Cisco PIX, Checkpoint.
Chapter 16 - Snort 101 Chapter 38 - Network Forensic Methodology
Chapter 17 - OSSEC 102 Chapter 39 - Network Evidence Acquisition
Chapter 18 - Intrusion Prevention System Chapter 40 - OS Logs and Splunk
Chapter 19 - Firewalls (Installation, Configuration and Usage)
Chapter 20 - OS Hardening for Networks - Linux and Windows
Chapter 21 - Cryptography Introduction Chapter 41 - Summary
Chapter 22 - Symmetric Key Encryption
Chapter 23 - Asymmetric Key Encryption
Chapter 24 - Hash functions
Chapter 25 - Trust models

For Details, Contact:
Innobuzz Knowledge Solutions Pvt. Ltd.
Building No.365, Third Floor, Kohat Enclave,
Next To Kohat Metro Station,
Pitampura, New Delhi-110034
Toll Free : 1800 103 2201
Telephone : 011-65905003

You might also like