Description
IT security is protection of information and especially the processing of information. IT security is intended to prevent the manipulation of data & system.
1: Introduction
- Welcome
- Motivation
- Objectives
- Prerequisites & Setup
2 : Concepts and Terms
- Malware
- Vulnerabilities, Threats, and Attacks
- Vulnerabilities and Threats
- Countermeasures
- Policies and Procedures
- Risks and Risk Management
- Risk Analysis and Mitigation
- Defense in Depth
- Security Domains
- Security vs. Convenience
- Security Goals
3: Malware
- Viruses, Worms, and Trojans
- Malware Characteristics
- Countermeasures
- Malware Detection and Removal
4: Understanding IT Security Risk
- Risk and Risk Management
- Threats and Attacker Motivation
- Internal Threats
- Examples of IT Security Risk
- Risk Valuation
- Risk Analysis and Mitigation
5: Internetworking Primer
- Internetworking
- Networking Concepts and Terms
- The OSI Reference Model
- TCP/IP
- IP Addresses
- Ethernet
- Internetwork Communications
- Routers
- Dynamic Host Control Protocol (DHCP)
- Domain Name Service (DNS)
- Address Resolution Protocol (ARP)
- Transport Layer
- User Datagram Protocol (UDP)
- Transport Control Protocol (TCP)
- What is a Virtual Private Network (VPN) ?
- Simple Network Management Protocol (SNMP)
6: Introduction to Firewalls
- What is a Firewall ?
- Network Address Translation (NAT)
- Stateless Packet Filtering
- Stateful Inspection
- Firewall Policy
- Firewalls and Network Architecture
- Testing
- Unified Policy Approach
- Best Practices
7: Macro Patterns
- Domains Revisited
- What are Macro Patterns ?
- Domains and Change
- Risk Management
- General Security
- Access Control
- Physical, Platform,Network,Application Security
8:Â Introduction to Cryptography
- Motivation
- Terms and Concepts
- Message Integrity
- Message Integrity: SHA
- Steganography
- Encryption Methods
- Symmetric Encryption
- Stream Ciphers
- Encryption Methods: Block Cipher Modes
- Data Encryption Standard (AES)
- Advanced Encryption Standard (AES)
- Secure Key Exchange
- Asymmetric Encryption (Public Key Cryptography)
- Overview of Cryptanalysis
9: Public Key Infrastructure
- Digital Signatures
- Digital Certificates
- Public Key Cryptography
- Public Key Infrastructure
- How HTTPS Works
- X.509 Digital Certificates
- Example: Digital Certificates
- Certificate Authorities
- Trust Models
- Certificate Validation
- Certificate Revocation
- Key Management
10:Â Understanding Virtual Private Networks (VPNs)
- VPN Technologies Overview
- Deployment Architectures
- IPsec Overview
- Authentication Header (AH)
- ESP
- Internet Key Exchange (IKE)
- IPComp
- VPN Operational Overview
- VPN Implementation
11: Wireless Network Security
- Overview
- WLAN Technologies and Standards
- WLAN Vulnerabilities
- WAP Countermeasures
- 802.11
- 802.11i
- Best Practices
12: Intrusion Detection and Prevention Systems
- Terms and Concepts
- Motivation
- Functions
- Network Based Solutions
- Detection Technologies
- Prevention Features
- IDS/IPS Deployment
- IDPS Limitations
- Host Based Solutions
- Protecting Wireless Networks
- IDPS Challenges
- Best Practices
- Sample Products
For more inputs on IT Security you can connect here.
Contact the L&D Specialist at Locus IT.
Locus Academy has more than a decade experience in delivering the training/staffing on IT Security for corporates across the globe. The participants for the training/staffing on IT Security are extremely satisfied and are able to implement the learnings in their on going projects.
Reviews
There are no reviews yet.