Aegis School of Business, Data Science, Cyber Security & Telecommunication

Aegis School of Business, Data Science, Cyber Security & Telecommunication

Application fee: 1000 * INR
Course fee: 35000 * INR
GST: 18 %

Network Security

Application fee : 1000 * INR

Details

Location: On-campus (India, Mumbai)
Type: Certificate course
Director: Mr. Satish Dwibhashi
Coordinator: Mr. Ritin Joshi
Language: English
Course fee: 35000 * INR
GST: 18%
Total course fee: 41300 * INR
Rating:
No Ratings

Gallery

Course Details

This is a core course to impart the knowledge and skills to initially assess network vulnerabilities and analyze the relevant threats. Consequently, the focus shifts to selection and deployment of appropriate countermeasures; evaluation of methods for strong authentication; and search for possible systemic vulnerabilities in operating systems. The aim is to discuss and practice how to reduce an organization’s exposure to security pitfalls in enterprise-wide and virtual private networks.
Course Objectives
• Identify the factors driving the need for network security
• Identify and classify particular examples of attacks
• Define the terms vulnerability, threat and attack
• Identify physical points of vulnerability in simple networks
• Compare and contrast symmetric and asymmetric encryption systems and their vulnerability to attack, and explain the characteristics of hybrid systems.
Syllabus

Course Curriculum

Topics

1. Introduction to Network Security

           Network Security – Importance & Needs, Security Components, Security Policies & Controls, Introduction of OSI, TCP/IP layer Architecture and Basic System Security

2. Identifying Security Threats, Assests and Vulnerabilities

            General Threats – Social Engineering & Malware, Assets, Physical Threats & Vulnerabilities, Software & Network based Threats, Wireless Network Threats & Vulnerabilities and Basic Mitigation Technique

3. Cryptography in Network Security

            What is Cryptography, Symmetric Key Cryptography, Asymmetric Key Cryptography, Block & Stream Cipher, Hashing, PKI, Private Key Management, Digital Certificate / Signature, Wireless Security settings and WAP concepts

4. Routing & Switching Concepts

            Routing process, Routing Protocols, Routed Protocols, NAT, Switching process, VLAN, Trunking,  STP, InterVLAN Communication and WLAN concepts.

5. Device & Infrastructure Security

            Firewall, VPN, IPS/IDS, Packet Filtering, Port Security, Proxy, Load Balancer, Access Points, SIEM, DHCP, DNSSEC, IPSEC, Mail Gateway and Media Gateway

6. Compliance & Operational Security

            Physical Security, Legal Compliance, Security Awareness & Training, Integrate Systems and Data with Third Parties

7. Identity and Access Management

            AAA, Types of Authentication, Network Security Tools, Trobleshoot common Security Issues and Common Security Technologies

8. Types of Attacks in Network Security

            DoS, DDoS, Man-in-the-middle, Buffer overflow, ARP poisoning, DNS Poisoning, Cross-site scripting, SQL Injection, Domain Hijacking, Session Hijacking, Sniffing, Port Scanning, MAC spoofing & IP spoofing

9. Mobile & Cloud Security

            Identifying Risk & Securing Mobile Devices, Sychnorization, Email on mobile, Mobile Security Awareness, Cloud Security, Cloud Deployment models: SAAS, PAAS, IAAS, Cloud Implementaion types, Cloud Storage, Security as a Services

10. Network Managment

            Network Monitoring – SNMP, Network Performance Optimization and Configuration Management Documentation

11. Network Forensics

            What is Network Forensics, Traffic protocols & Network layer analyzed, Types of system to scan, Pros & Cons and Forensics Tools