Objective of the Course

This training program will enable you to: Implement technical strategies, tools, and techniques to secure data and information for your organization Adhere to ethical security behaviour for risk analysis and mitigation Understand security in cloud computing architecture in depth Comprehend legal requirements, privacy issues and audit process methodologies within the cloud environment Focus on IT compliance and the integrity of enterprise systems to establish a more secure enterprise IT framework

Course Contents

Unit 1: Network Security
Module 1: Access Control and Intrusion Detection
Lesson 1: Overview of Identification and Authorization Lesson 2: I & A Techniques Lesson 3: Overview of IDS Lesson 4: Intrusion Detection Systems and Intrusion Prevention Systems
Module 2: Server Management and Firewalls
Lesson 1: User Management Lesson 2: DNS Routing and Load Balancing Lesson 3: Overview of Firewalls Lesson 4: Types of Firewalls Lesson 5: DMZ and firewall features
Module 3: Security for VPN and Next Generation Networks
Lesson 1: VPN Security Lesson 2: Security in Multimedia Networks Lesson 3: Fax Security Lesson 4: Link Encryption Devices

Unit 2: System and Application Security
Module 1: Security Architectures and Models
Lesson 1:Desiging Secure Operating Systems Lesson 2: Controls to enforce security services Lesson 3: Information flow model and Biba model
Module 2: System Security
Lesson 1: Desktop Security Lesson 2: email security: PGP and SMIME Lesson 3: Web Security: web authentication, SSL and SET
Module 3: OS Security
Lesson 1: OS Security Vulnerabilities, updates and patches Lesson 2: OS integrity checks Lesson 3: Anti-virus software Lesson 4: Design of secure OS and OS hardening Lesson 5: Configuring the OS for security Lesson 6: Trusted OS

Choose the course plan