Duration: Hours

IT security is the protection of information and especially the processing of information. IT security is intended to prevent the manipulation of data and systems by unauthorized third parties.

Training Mode: Online

Enquiry

    Category:

    Description

    1: Introduction

    • Welcome
    • Motivation
    • Objectives
    • Prerequisites & Setup

    2 : Concepts and Terms

    • Malware
    • Vulnerabilities, Threats, and Attacks
    • Vulnerabilities and Threats
    • Countermeasures
    • Policies and Procedures
    • Risks and Risk Management
    • Risk Analysis and Mitigation
    • Defense in Depth
    • Security Domains
    • Security vs. Convenience
    • Security Goals

    3: Malware

    • Viruses, Worms, and Trojans
    • Malware Characteristics
    • Countermeasures
    • Malware Detection and Removal

    4: Understanding IT Security Risk

    • Risk and Risk Management
    • Threats and Attacker Motivation
    • Internal Threats
    • Examples of IT Security Risk
    • Risk Valuation
    • Risk Analysis and Mitigation

    5: Internetworking Primer

    • Internetworking
    • Networking Concepts and Terms
    • The OSI Reference Model
    • TCP/IP
    • IP Addresses
    • Ethernet
    • Internetwork Communications
    • Routers
    • Dynamic Host Control Protocol (DHCP)
    • Domain Name Service (DNS)
    • Address Resolution Protocol (ARP)
    • Transport Layer
    • User Datagram Protocol (UDP)
    • Transport Control Protocol (TCP)
    • What is a Virtual Private Network (VPN) ?
    • Simple Network Management Protocol (SNMP)

    6: Introduction to Firewalls

    • What is a Firewall ?
    • Network Address Translation (NAT)
    • Stateless Packet Filtering
    • Stateful Inspection
    • Firewall Policy
    • Firewalls and Network Architecture
    • Testing
    • Unified Policy Approach
    • Best Practices

    7: Macro Patterns

    • Domains Revisited
    • What are Macro Patterns ?
    • Domains and Change
    • Risk Management
    • General Security
    • Access Control
    • Physical, Platform,Network,Application Security

    8: Introduction to Cryptography

    • Motivation
    • Terms and Concepts
    • Message Integrity
    • Message Integrity: SHA
    • Steganography
    • Encryption Methods
    • Symmetric Encryption
    • Stream Ciphers
    • Encryption Methods: Block Cipher Modes
    • Data Encryption Standard (AES)
    • Advanced Encryption Standard (AES)
    • Secure Key Exchange
    • Asymmetric Encryption (Public Key Cryptography)
    • Overview of Cryptanalysis

    9: Public Key Infrastructure

    • Digital Signatures
    • Digital Certificates
    • Public Key Cryptography
    • Public Key Infrastructure
    • How HTTPS Works
    • X.509 Digital Certificates
    • Example: Digital Certificates
    • Certificate Authorities
    • Trust Models
    • Certificate Validation
    • Certificate Revocation
    • Key Management

    10: Understanding Virtual Private Networks (VPNs)

    • VPN Technologies Overview
    • Deployment Architectures
    • IPsec Overview
    • Authentication Header (AH)
    • ESP
    • Internet Key Exchange (IKE)
    • IPComp
    • VPN Operational Overview
    • VPN Implementation

    11: Wireless Network Security

    • Overview
    • WLAN Technologies and Standards
    • WLAN Vulnerabilities
    • WAP Countermeasures
    • 802.11
    • 802.11i
    • Best Practices

    12: Intrusion Detection and Prevention Systems

    • Terms and Concepts
    • Motivation
    • Functions
    • Network Based Solutions
    • Detection Technologies
    • Prevention Features
    • IDS/IPS Deployment
    • IDPS Limitations
    • Host Based Solutions
    • Protecting Wireless Networks
    • IDPS Challenges
    • Best Practices
    • Sample Products

    For more inputs on IT Security you can connect here.
    Contact the L&D Specialist at Locus IT.

     

    Reviews

    There are no reviews yet.

    Be the first to review “IT SECURITY PROGRAM”

    Your email address will not be published.