Certified Network Security Professional Course Outline

Course Outline


Networking Concepts
  • Understanding the basics of communication systems like sender, media, receiver, etc.
  • Explaining the various transmission media and concept of OSI and TCP/IP protocols
  • Describing the concepts of LAN, WAN, wireless networks and internetworking
  • Detailing the different packet formats used by TCP/IP protocols and ports
Security Concepts
  • Illustrating the principles and concepts of security
  • Describing the basics and techniques for identification and authentication
  • Explaining the various types of attack on computing resources
  • Detailing the concept of computer forensics for investigation and steganography for information hiding
Security Policy
  • Understanding the basics and method for defining security policies and guidelines
  • Defining the procedure to follow for security incidents
Security Models
  • Explaining the various security models like Biba , Bell-la padula, etc.
  • Describing the different types of access controls like mandatory or discretionary, etc.
  • Illustrating the evolution of cryptography and different data encryption ciphers used
  • Detailing the concepts and techniques for symmetric and asymmetric key cryptography and private and public key exchange
  • Understanding the various techniques of secret key cryptography
  • Explaining the basics of message authentication, hash function, digital signature and public key infrastructure (PKI)
Hardware Security
  • Describing the concept and usage of smart card, access token and biometrics for hardware-based security implementation
Router Hardening and ACL
  • Understanding the process of routing and provisions for router security
  • Illustrating the steps to create and implement access control lists (ACL)
  • Describing the procedure to remove unwanted Protocols and Services and enable router logging
  • Explaining the concepts and types of intrusion detection systems (IDS)
  • Illustrating the signature detection in IDS and log analysis of IDS systems
  • Understanding the concept of firewall and various components and types of firewall
  • Describing the basics of firewall policy, rule sets and packet filters in firewall
  • Illustrating proxy server, bastion host, DMZ and honeypot used with firewall for security management
  • Explaining the working of ISA Server and IPTables for Windows and Linux
Wireless Security
  • Describing the basics of wireless application protocol and access point security
  • Explaining the usage of wireless PKI
  • Illustrating the various wireless security solutions and need for auditing
System Security
  • Detailing the techniques for desktop security by anti-virus software
  • Understanding Email security implementation by PGP and S/MIME
  • Explaining the concepts of web authentication, SSL, IPSec, TLS and SET for implementing web security
  • Illustrating the basics of virtual private network (VPN), VPN types and architecture for implementation
OS Security
  • Understanding the significance and basics of OS vulnerabilities, updates and patches
  • Illustrating the concept of OS integrity checks and trusted OS
  • Describing the techniques for OS hardening for Linux and Windows 2003
Security Management
  • Describing the essentials for network management and usage of SNMP for same
  • Explaining the procedure to manage incident response
  • Illustrating the process of risk management and analysis for securing assets
  • Understanding the concept and importance of business continuity planning and disaster recovery for recovering from security incidents
Regulations and compliance
  • Explaining the relevance of laws and policies
  • Describing the IT Act, IPC and copyright act as applied to organization
  • Illustrating the concept and relevance of privacy as applied to data asset
  • Detailing the steps to publish and importance of email policy
Apply for Certification
 For Support