Diploma on Network Security

Course Covers: CISE Level 1 v.4.0 & CISE Level 2 Network Security
Program Duration: 100 Hrs. / 6 Months
2 Certification & 1 Diploma on Network Security.

Training Module – L1: Ethical Hacking:-
• Chapter 1 – Introduction
• Chapter 2 – Networking
• Chapter 3 – Footprinting/Reconnaissance
• Chapter 4: Google Hacking
• Chapter 5: Scanning
• Chapter 6: System Hacking: Win7 and Linux
• Chapter 7: Android & iPhone Hacking
• Chapter 8: Malwares
• Chapter 9: SQL Injection
• Chapter 10: Cross Site Scripting
• Chapter 11: Sniffing
• Chapter 12: Social Engineering
• Chapter 13: Identity Theft Fraud
• Chapter 14: Denial of Service
• Chapter 15: Session Hijacking
• Chapter 16: Penetration Testing
• Chapter 17: Exploit Writing & Buffer Overflow
• Chapter 18: Cryptography & Steganography
• Chapter 19: Firewalls & Honeypots
• Chapter 20: IDS & IPS
• Chapter 21: Hacking Web Server
• Chapter 22: Wireless Hacking
• Chapter 23: Physical Security
• Chapter 24: Reverse Engineering
• Chapter 25: Email Hacking
• Chapter 26: Security Compliance and Auditing
• Chapter 27:Incident Handling & Computer forensics

Training Module – L2: NETWORK SECURITY :-
• Chapter 1 – Network Topology
• Chapter 2 – Open Systems Interconnectivity Model
• Chapter 3 – TCP/IP In-depth
• Chapter 4 – WAP, NAT, DNS and ICMP
• Chapter 5 – Internet Routing
• Chapter 6 – Advanced Port Scanning
• Chapter 7 – Sniffing Attacks
• Chapter 8 – Masquerading Attacks
• Chapter 9 – Advanced DOS and DDOS
• Chapter 10 – Session Hijacking Attacks
• Chapter 11 – Network Operations Center – Security
• Chapter 12 – Network Traffic Analysis
• Chapter 13 – Network Vulnerability Assessment
• Chapter 14 – Network Penetration Testing
• Chapter 15 – Intrusion Detection System
• Chapter 16 – Snort 101
• Chapter 17 – OSSEC 102
• Chapter 18 – Intrusion Prevention System
• Chapter 19 – Firewalls (Installation, Configuration and Usage)
• Chapter 20 – OS Hardening for Networks – Linux and Windows
• Chapter 21 – Cryptography – Introduction
• Chapter 22 – Symmetric Key Encryption
• Chapter 23 – Asymmetric Key Encryption
• Chapter 24 – Hash functions
• Chapter 25 – Trust models
• Chapter 26 – VLAN – Security
• Chapter 27 – VPN – Security
• Chapter 28 – Wireless Networks – Introduction
• Chapter 29 – Radio Frequency Essentials
• Chapter 30 – Wireless Security – Basics
• Chapter 31 – Wireless Threats
• Chapter 32 – Attacking Wireless Hotspot and Security
• Chapter 33 – WEP Security
• Chapter 34 – WPA/WPA2 Security
• Chapter 35 – Secure Wireless Infrastructure Deployment
• Chapter 36 – DNS Tunneling
• Chapter 37 – Network Forensic Methodology
• Chapter 38 – Network Evidence Acquisition
• Chapter 39 – OS Logs and Splunk
• Chapter 40 – Summary

For Detailed Enquiry:-