
Security continues to be one of the top #10 priorities for most CIOs. In order to create awareness for security threats, CIO Specialist has designed a comprehensive course where you have the flexibility to customize your training based on your requirements. Our curriculum broadly covers Network security threats, counter measures, NOC, logging, Firewall security, router, encryption, Switch/VLAN, WI-FI, Tools, Internet, Honey Pots, IDS/IPS etc. Our security course is conducted by a former CIO & CISO with more than two decades of experience and a doctorate in this subject. We also bring the awareness of cyber Law, cyber security policy & IT act along with this course.
Coverage
Session-1: Introduction and Overview of Network types, components and security issues
Session-2: Networking Security Threats & Vulnerabilities
Session-3: Network countermeasures
Session-4: Network Operating controls
Session-5: Logging
Session-6: Overview of Firewall, Types of Firewall and its architecture as per security standards
Session-7: Firewall components
Session-8: Overview of IDS (NIDS & HIDS) / IPS and its components (Sensor, analyser, Admin-console, user interface)
Session-9:Testing of Firewall security / Access rules
Session-10: Network Change Control Management. system (rule based)-modifying rules and other authentication mechanisms, Auditing on Network components
Session-11: Encryption methodology, third party software used as an additional service Session-12: Router Security
Session-13: Introduction to Switch / VLAN - Layered switch / VPN
Session-14: WI-FI and Security measures
Session-15: Tools
Session-16: Social Media, Cyber Security and IT Act
Session-2: Networking Security Threats & Vulnerabilities
Session-3: Network countermeasures
Session-4: Network Operating controls
Session-5: Logging
Session-6: Overview of Firewall, Types of Firewall and its architecture as per security standards
Session-7: Firewall components
Session-8: Overview of IDS (NIDS & HIDS) / IPS and its components (Sensor, analyser, Admin-console, user interface)
Session-9:Testing of Firewall security / Access rules
Session-10: Network Change Control Management. system (rule based)-modifying rules and other authentication mechanisms, Auditing on Network components
Session-11: Encryption methodology, third party software used as an additional service Session-12: Router Security
Session-13: Introduction to Switch / VLAN - Layered switch / VPN
Session-14: WI-FI and Security measures
Session-15: Tools
Session-16: Social Media, Cyber Security and IT Act
why we need to be more careful?
|
|
|