Network Security

Home
Netsec

Certified Information Security Expert Level 2: Network Security

This training Program aims at imparting skills required to secure a Network from Internal and External Threats by understanding and analyzing the Vulnerabilities which exist in a Network. We cover building an appropriate Network Security Infrastructure required to Monitor and Secure a Network, wired or wireless by using the correct Hardware, Software and Penetration Testing - Ethical Hacking Infrastructure. We will be practically understanding various network based attacks, Intrusion Detection Systems, Intrusion Prevention Systems, Firewalls, Virtual LANs, Virtual Private Networks, Network Encryption, Wireless Network Security, DNS Tunneling and Network Forensics.

Training Duration: 60 hours   Pre-requisite: CISE Level 1.
  • Chapter 1 - Network Topology
  • Chapter 2 - Open System Interconnectivity Model
  • Chapter 3 - TCP/IP In-depth
  • Chapter 4 - WAP, NAT, DNS, and ICMP
  • Chapter 5 - Internet Routing
  • Chapter 6 - Advanced Port Scanning
  • Chapter 7 - Sniffing Attacks
  • Chapter 8 - Masquerading Attacks
  • Chapter 9 - Advanced DOS and DDOS
  • Chapter 10 - Session Hijacking Attacks
  • Chapter 11 - Network Operations Center - Security
  • Chapter 12 - Network Traffic Analysis
  • Chapter 13 - Network Vulnerability Assesment
  • Chapter 14 - Network Penetration Testing
  • Chapter 15 - Intrusion Detection System
  • Chapter 16 - Snort 101
  • Chapter 17 - OSSEC 102
  • Chapter 18 - Intrusion Prevention System
  • Chapter 19 - Firewalls (Installation, Configuration and Usage)
  • Chapter 20 - OS hardening for Networks - Linux and Windows
  • Chapter 21 - Cryptography - Introduction
  • Chapter 22 - Symmetric Key Encryption
  • Chapter 23 - Assymetric Key Encryption
  • Chapter 24 - Hash Functions
  • Chapter 25 - Trust Models
  • Chapter 26 - VLAN - Security
  • Chapter 27 - VPN - Security
  • Chapter 28 - Wireless Networks - Introduction
  • Chapter 29 - Radio Frequency Essentials
  • Chapter 30 - Wireless Security - Basics
  • Chapter 31 - Wireless Threats
  • Chapter 32 - Attacking Wireless Hotspots and Security
  • Chapter 33 - WEP Security
  • Chapter 34 - WPA/WPA2 Security
  • Chapter 35 - Secure Wireless Infrastructure Deployment
  • Chapter 36 - DNS Tunneling
  • Chapter 37 - Network Forensics Methodology
  • Chapter 38 - Network Evidence Acquisition
  • Chapter 39 - OS Logs and Splunk
  • Chapter 40 - Summary