Aegis School of Business, Data Science, Cyber Security & Telecommunication
Application fee: | 1000 * INR |
Course fee: | 35000 * INR |
GST: | 18 % |
This is a core course to impart the knowledge and skills to initially assess network vulnerabilities and analyze the relevant threats. Consequently, the focus shifts to selection and deployment of appropriate countermeasures; evaluation of methods for strong authentication; and search for possible systemic vulnerabilities in operating systems. The aim is to discuss and practice how to reduce an organization’s exposure to security pitfalls in enterprise-wide and virtual private networks.
Course Objectives
• Identify the factors driving the need for network security
• Identify and classify particular examples of attacks
• Define the terms vulnerability, threat and attack
• Identify physical points of vulnerability in simple networks
• Compare and contrast symmetric and asymmetric encryption systems and their vulnerability to attack, and explain the characteristics of hybrid systems.
Syllabus
Course Curriculum
Topics |
1. Introduction to Network Security Network Security – Importance & Needs, Security Components, Security Policies & Controls, Introduction of OSI, TCP/IP layer Architecture and Basic System Security |
2. Identifying Security Threats, Assests and Vulnerabilities General Threats – Social Engineering & Malware, Assets, Physical Threats & Vulnerabilities, Software & Network based Threats, Wireless Network Threats & Vulnerabilities and Basic Mitigation Technique |
3. Cryptography in Network Security What is Cryptography, Symmetric Key Cryptography, Asymmetric Key Cryptography, Block & Stream Cipher, Hashing, PKI, Private Key Management, Digital Certificate / Signature, Wireless Security settings and WAP concepts |
4. Routing & Switching Concepts Routing process, Routing Protocols, Routed Protocols, NAT, Switching process, VLAN, Trunking, STP, InterVLAN Communication and WLAN concepts. |
5. Device & Infrastructure Security Firewall, VPN, IPS/IDS, Packet Filtering, Port Security, Proxy, Load Balancer, Access Points, SIEM, DHCP, DNSSEC, IPSEC, Mail Gateway and Media Gateway |
6. Compliance & Operational Security Physical Security, Legal Compliance, Security Awareness & Training, Integrate Systems and Data with Third Parties |
7. Identity and Access Management AAA, Types of Authentication, Network Security Tools, Trobleshoot common Security Issues and Common Security Technologies |
8. Types of Attacks in Network Security DoS, DDoS, Man-in-the-middle, Buffer overflow, ARP poisoning, DNS Poisoning, Cross-site scripting, SQL Injection, Domain Hijacking, Session Hijacking, Sniffing, Port Scanning, MAC spoofing & IP spoofing |
9. Mobile & Cloud Security Identifying Risk & Securing Mobile Devices, Sychnorization, Email on mobile, Mobile Security Awareness, Cloud Security, Cloud Deployment models: SAAS, PAAS, IAAS, Cloud Implementaion types, Cloud Storage, Security as a Services |
10. Network Managment Network Monitoring – SNMP, Network Performance Optimization and Configuration Management Documentation |
11. Network Forensics What is Network Forensics, Traffic protocols & Network layer analyzed, Types of system to scan, Pros & Cons and Forensics Tools |