Information Security Foundation

Course Covers: Computer Fundamentals and Computer Networks, Operating System Administration, Information Security Concepts
Program Duration: 160 Hrs. / 6 Months.

Total No. of modules : 4

Training Module- 1: Computer Fundamentals and Computer Networks
• Chapter 1 – Overview of PC Architecture
• Chapter 2 – Different bus standards
• Chapter 3 – Different Add-on Cards like memory, Graphics etc
• Chapter 4 – Operating System Architecture
• Chapter 5 – Process Management
• Chapter 6 – Memory Management
• Chapter 7 – File System Management
• Chapter 8 – Introduction to Network OS
• Chapter 9 – Basics of Communication Systems
• Chapter 10 -Transmission Media
• Chapter 11 – OSI, TCP/IP Model
• Chapter 12 – Local Area Networks
• Chapter 13 – Wide Area Networks
• Chapter 14 – Networking Protocols
• Chapter 15 – IP addressing & Routing
• Chapter 16 – Understanding & Recognizing TCP,IP,UDP, ICMP, Ethernet Packets
• Chapter 17 – Internetworking Devices
• Chapter 18 – Wireless Networks

Training Module – 2: Operating System Administration
Windows Operating System
• Chapter 1 – Introduction to Windows Operating System
• Chapter 2 – Installation & Configuration
• Chapter 3 – Installation & Managing Active Directory
• Chapter 4 – Managing & Securing Resources
• Chapter 5 – Performance & Maintenance
Linux Operating System
• Chapter 6 – Introduction to Linux
• Chapter 7 – Linux Installation
• Chapter 8 – Booting Procedure
• Chapter 9 – Linux Commads & Shell Programing
• Chapter 10 – System Administration
• Chapter 11 – X Windows
• Chapter 12 – Performance Tuning

Training Module -3: Information Security 
• Chapter 1 – Basics of Information Security
• Chapter 2 – Security Threats and Vulnerability
• Chapter 3 – Cryptography
• Chapter 4 – Identification and Authentication
• Chapter 5 – Network Security
• Chapter 6 – Security Tools & Techniques
• Chapter 7 – Internet Security
• Chapter 8 – Email Security
• Chapter 9 – Wireless Security
• Chapter 10 -Risk Assessment & Disaster Recovery
• Chapter 11 – Computer Forensic
• Chapter 12 – Information Security Laws

Training Module -4: System Security 
• Chapter 1 – Design of Secure Operating System
• Chapter 2 – Design of Trusted Operating System
• Chapter 3 – Operating System Hardening
• Chapter 4 – Operating System Controls
• Chapter 5 – Internet Protocols & Security
• Chapter 6 – Application Security
• Chapter 7 – WWW Security
• Chapter 8 – SHTTP
• Chapter 9 – SMIME
• Chapter 10 -PGP
• Chapter 11 – SET
• Chapter 12 – Email Security & Instant Message Security
• Chapter 13 -Access Controls
• Chapter 14 – Internet Security Protocols
• Chapter 15 – Managing Personal Firewall and Antivirus
• Chapter 16 – Remote Access Security
• Chapter 17 – Secure Configuration of Web Server
• Chapter 18 -Secure Configuration of Database Server
• Chapter 19 – Secure Configuration of Email Server

Enquiry