Course Outline
Networking Concepts
- Understanding the basics of communication systems like sender, media, receiver, etc.
- Explaining the various transmission media and concept of OSI and TCP/IP protocols
- Describing the concepts of LAN, WAN, wireless networks and internetworking
- Detailing the different packet formats used by TCP/IP protocols and ports
Security Concepts
- Illustrating the principles and concepts of security
- Describing the basics and techniques for identification and authentication
- Explaining the various types of attack on computing resources
- Detailing the concept of computer forensics for investigation and steganography for information hiding
Security Policy
- Understanding the basics and method for defining security policies and guidelines
- Defining the procedure to follow for security incidents
Security Models
- Explaining the various security models like Biba , Bell-la padula, etc.
- Describing the different types of access controls like mandatory or discretionary, etc.
Cryptography
- Illustrating the evolution of cryptography and different data encryption ciphers used
- Detailing the concepts and techniques for symmetric and asymmetric key cryptography and private and public key exchange
- Understanding the various techniques of secret key cryptography
- Explaining the basics of message authentication, hash function, digital signature and public key infrastructure (PKI)
Hardware Security
- Describing the concept and usage of smart card, access token and biometrics for hardware-based security implementation
Router Hardening and ACL
- Understanding the process of routing and provisions for router security
- Illustrating the steps to create and implement access control lists (ACL)
- Describing the procedure to remove unwanted Protocols and Services and enable router logging
IDS
- Explaining the concepts and types of intrusion detection systems (IDS)
- Illustrating the signature detection in IDS and log analysis of IDS systems
Firewalls
- Understanding the concept of firewall and various components and types of firewall
- Describing the basics of firewall policy, rule sets and packet filters in firewall
- Illustrating proxy server, bastion host, DMZ and honeypot used with firewall for security management
- Explaining the working of ISA Server and IPTables for Windows and Linux
Wireless Security
- Describing the basics of wireless application protocol and access point security
- Explaining the usage of wireless PKI
- Illustrating the various wireless security solutions and need for auditing
System Security
- Detailing the techniques for desktop security by anti-virus software
- Understanding Email security implementation by PGP and S/MIME
- Explaining the concepts of web authentication, SSL, IPSec, TLS and SET for implementing web security
- Illustrating the basics of virtual private network (VPN), VPN types and architecture for implementation
OS Security
- Understanding the significance and basics of OS vulnerabilities, updates and patches
- Illustrating the concept of OS integrity checks and trusted OS
- Describing the techniques for OS hardening for Linux and Windows 2003
Security Management
- Describing the essentials for network management and usage of SNMP for same
- Explaining the procedure to manage incident response
- Illustrating the process of risk management and analysis for securing assets
- Understanding the concept and importance of business continuity planning and disaster recovery for recovering from security incidents
Regulations and compliance
- Explaining the relevance of laws and policies
- Describing the IT Act, IPC and copyright act as applied to organization
- Illustrating the concept and relevance of privacy as applied to data asset
- Detailing the steps to publish and importance of email policy
https://www.vskills.in/certification/Certified-Network-Security-Professional