Syllabus: The syllabus is broadly structured as follows:

Similar documents
Security+ SY0-501 Study Guide Table of Contents

Strategic Infrastructure Security

CompTIA Security+ (Exam SY0-401)

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

CompTIA Security+ Certification

This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

CompTIA Network+ Study Guide Table of Contents

Software Development & Education Center Security+ Certification

(2½ hours) Total Marks: 75

Introduction and Overview. Why CSCI 454/554?

CompTIA Security+ (2008 Edition) Exam

Understanding Cisco Cybersecurity Fundamentals

Cyber Security & Ethical Hacking Training. Introduction to Cyber Security Introduction to Cyber Security. Linux Operating System and Networking: LINUX

SYLLABUS. DIVISION: Business and Engineering Technology REVISED: FALL 2015 CREDIT HOURS: 4 HOURS/WK LEC: 4 HOURS/WK LAB: 0 LEC/LAB COMB: 4

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

Chapter 19 Security. Chapter 19 Security

Network Security and Cryptography. December Sample Exam Marking Scheme

ETHICAL HACKING & COMPUTER FORENSIC SECURITY

CS System Security 2nd-Half Semester Review

Cybersecurity Foundations

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

Information Security Training Needs Assessment Study. Dr. Melissa Dark CERIAS Assistant Professor Continuing Education Director

Fundamentals of Network Security v1.1 Scope and Sequence

HP Instant Support Enterprise Edition (ISEE) Security overview

Certified Ethical Hacker (CEH)

Table of Contents (CISSP 2012 Edition)

Total No. of Questions : 09 ] [ Total No.of Pages : 02

CONTENTS. vii. Chapter 1 TCP/IP Overview 1. Chapter 2 Symmetric-Key Cryptography 33. Acknowledgements

CompTIA Advanced Security Practitioner (CASP) (Exam CAS-001)

3+1+0 (3) IT 201 T. Principles of Information and Technology Systems. Prereq: CS 110T IT 222 T. Communications and Networks Fundamentals (4)

CompTIA Cybersecurity Analyst+

MLR Institute of Technology

Transport Level Security

Ethical Hacker Foundation and Security Analysts Course Semester 2

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

E-Commerce Security Pearson Prentice Hall, Electronic Commerce 2008, Efraim Turban, et al.

Int ernet w orking. Internet Security. Literature: Forouzan: TCP/IP Protocol Suite : Ch 28

Mobile MOUSe HACKING REVEALED ONLINE COURSE OUTLINE

Securing Information Systems

Cryptography and Network Security

Exam : Title : Security Solutions for Systems Engineers(SSSE) Version : Demo

A policy that the user agrees to follow before being allowed to access a network.

The GenCyber Program. By Chris Ralph

INFS 766 Internet Security Protocols. Lecture 1 Firewalls. Prof. Ravi Sandhu INTERNET INSECURITY

Remote Connectivity for SAP Solutions over the Internet Technical Specification

ISC2. Exam Questions CISSP. Certified Information Systems Security Professional (CISSP) Version:Demo

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PROTECTING INFORMATION ASSETS NETWORK SECURITY

Top-Down Network Design

Security Pro - English 5.1.x LESSON PLAN

Informal Write-up on CCNA Security. October, 2009 (V1.0)

SINGLE COURSE. NH9000 Certified Ethical Hacker 104 Total Hours. COURSE TITLE: Certified Ethical Hacker

CompTIA Security+ (Exam SY0-401) Course 01 Security Fundamentals

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Systems Analysis and Design in a Changing World, Fourth Edition

Implementing Cisco Cybersecurity Operations

CompTIA JK CompTIA Academic/E2C Security+ Certification. Download Full Version :

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

An Overview of Secure and Authenticated Remote Access to Central Sites

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

CompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018

Systems and Principles Unit Syllabus

Pearson CISSP Cert Guide with Labs. Course Outline. Pearson CISSP Cert Guide with Labs. 17 Oct

Authentication. Chapter 2


CND Exam Blueprint v2.0

Exam Questions SC0-471

Information Security in Corporation

Security Assessment Checklist

Certified Cyber Security Analyst VS-1160

Chapter 8. Network Security. Cryptography. Need for Security. An Introduction to Cryptography 10/7/2010

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 10 Authenticating Users

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Chapter 4. Network Security. Part I

Objectives. Classes of threats to networks. Network Security. Common types of network attack. Mitigation techniques to protect against threats

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

Network Security and Cryptography. 2 September Marking Scheme

KINGS IT2042 INFORMATION SECURITY. Batch : Staff Name : NALAYINI P & AMBIKA J. Academic Year. Page 1. Kings College of Engineering

Comptia.Certkey.SY0-401.v by.SANFORD.362q. Exam Code: SY Exam Name: CompTIA Security+ Certification Exam

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

Pearson CISSP Lab. Course Outline. Pearson CISSP Lab. 05 Apr

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

Chapter 5 Authentication and Basic Cryptography

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Course Outline. CISSP - Certified Information Systems Security Professional

The IINS acronym to this exam will remain but the title will change slightly, removing IOS from the title, making the new title.

CompTIA Security+(2008 Edition) Exam

Configuring L2TP over IPsec

itexamdump 최고이자최신인 IT 인증시험덤프 일년무료업데이트서비스제공

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

VPN Ports and LAN-to-LAN Tunnels

Access Controls. CISSP Guide to Security Essentials Chapter 2

Advanced Diploma on Information Security

Implementing Cisco Network Security (IINS) 3.0

Transcription:

Syllabus: The syllabus is broadly structured as follows:

SR. NO. TOPICS SUBTOPICS 1 Foundations of Network Security Principles of Network Security Network Security Terminologies Network Security and Data Availability Components of Network Security Network Security Policies 2 Advanced TCP/IP TCP/IP Concepts Subnet Masks Variable Length Subnet Masks Unicast,Broadcast and Multiple Concepts The Three way Handshake The Process of DHCP and APIPA Internet Protocol version 6 3 IP Packet Structure and Analysis Capture and Identify IP Datagrams Capture and Identify ICMP Messages Capture and Identify TCP Headers Capture and Identify UDP Headers Packet Fragmentation The Three way Handshake 4 Routing and Access Control Lists Arp Process Cisco Routing Modes Routing Process Routing Tables Access Control Lists Implement Access Control Lists Limitations DNS and Its Role 5 Securing Windows Windows NT 4.0 Fundamental Security

Windows NT Resource Security Windows 2000 Infrastructure Windows 2000 Authentication Windows 2000 User and Group Security Windows 2000 Resource Security Windows 2000 Network Security 6 Securing Linux Key Concepts Linux Administration and Security Key Linux Network Files Key Linux Network Process Key Linux Network Commands Hardening Linux Network File System and Linux Network Information Service and Linux 7 Security on the Internet and Wor ld Wide Web Components of Internet Weak Points of Internet Techniques of Web Hacking Methods of Attacking Users 8 Attack Techniques Network Reconnaissance Mapping and sweeping the Network Scanning the Network Viruses, Worms and Trojan Horses Gaining Control on Systems Record Keystrokes Crack Encrypted Passwords Reveal Hidden Passwords

Case Study Social Engineering Gain Unauthorised Access Hide evidence of Attack Perform a Denial of Service attack 9 Network Defense Fundamentals Concepts, & Key Issues Identify Defensive Technologies Objectives of Access Control Identify Impact of Defense Concepts of Network Auditing 10 Designing and Configuring Firew all Systems Firewall Components Creating a FW Policy Rule Sets and Packet Filters Proxy Server Bastion Host and Honey pot FW Implementation Practices Installing and Configuring FW Monitor FW Installing and configuring ISA Server 2000 Monitor ISA Server IP Chains Concepts Implementing FW Technologies 11 Configuring VPN s VPN Fundamentals IP Security Protocol VPN Design and Architecture VPN Security Configuring a VPN

12 Designing an IDS Definition and Components of IDS Technologies and Techniques Host Based IDS Network Based IDS Basics of Analysis How to Use an IDS Limitations of IDS 13 Configuring an IDS Snort Foundations Installing Snort Snort as an IDS IDS center Configuring ISS Scanners 14 Analyzing Intrusion Signatures Concepts of Signature Analysis Common Vulnerabilities and Exposures Signatures Normal Traffic Signatures Abnormal Traffic Signatures 15 Performing a Risk Analysis Concepts of Risk Analysis Methods of Risk Analysis The Process of Risk Analysis Techniques of Minimize Risk Continual Risk Analysis 16 Creating a Security Policy Concepts of Security Policy Policy Design & Standards i.e. BS 7799 Various Policies Sample Policy

Incident Handling and Escalation Procedures Partner Policies FW Implementation Practices Installing and Configuring FW Monitor FW Installing and configuring ISA Server 2000 Monitor ISA Server IP Chains Concepts Implementing FW Technologies 17 Cryptography Fundamentals What is Cryptography? History of Encryption Symmetric versus Asymmetric Combined Solutions Private Key versus Public Key Data Encryption Standard (DES) Advanced Encryption Standard (AES) RSA, Diffie-Hellman MD4, MD5, SHA-1 18 Strong Authentication Authentication Fundamentals Identification versus Verification Two Factor Authentication Strong Authentication Smart Cards and Tokens Authentication interoperating with Biometrics 19 Digital Signatures Definition and Characteristics

How Digital Signatures function Message Digest Functions Digital Signatures with Message Digest E-Signature Law and Legal Issues Key Length (56, 112, and 128 bit) RSA and DSS Signature Standards 20 PKI Standards Definition of X.509 Functions of S/MIME Integration of LDAP Implementation of IPSec Identify and Implement Kerberos IETF PKI Standards (PKIX) PCKS (1 through 5) 21 PKI Fundamentals Terminology and Definition Core Services Digital Certificates Certificate Authority Key Distribution and Management PKI Policies Certificate Revocation Lists LDAP and Enterprise Data Repository 22 Biometrics Fundamentals Fingerprint Scanning Facial Scanning Iris Scanning Hand Scanning Retina Scanning

DNA Analysis Voice Recognition 23 Sign-On Solutions Secure Login to Desktop Inactivity Control Encryption of Network Traffic Credential Storage Smart Cards Virtual Cards 24 Secure E-Mail Implementation Secure use of Netscape Messenger Secure use of Microsoft Outlook Secure use of Microsoft Outlook Express PGP Implementation Sending Signed E-Mail Messages E-Mail encryption and Decryption Methods 25 File Encryption Solutions Automatic File Encryption Microsoft Encrypted File System (EFS) Creating Protective Folders Group Encryption Key Recovery and Management of Keys 26 PKI Solutions and Applications Secure E-Mail Solutions Secure SSL Applications Secure VPN Solutions Secure Document Transfer Certificate Revocation

27 Legal Issues of Network Security Laws on Licensing, Intellectual Properties, Liability, and T rans-border Data Flow. Legal Organizations HIPAA (Health Insurance Portability and Accountability Act) Civil Litigations / Tort Law Ethics and the Internet (RFC 1087) 28 Network Forensics Sector-Level Disk Analysis Incident Response Procedures Computer-Based Evidence Computer Forensics Examination Computer Crime Legislation Data Storage Practices Data Recovery Techniques 29 Physical Security Facility Requirements Technical Controls Environment/Life Safety Physical Security Threats Elements of Physical Security 30 Business Continuity Planning (BC P) and Disaster Recovery Plannin g (DRP) Business Impact Assessments Recovery Stratergy Recovery Paln Development Implementations and Recovery Techniques Elements pf BCP and BCP/DRP events 31 Law, Investigations and Ethics Laws and its categories Investigations Processes and Techniques

Computer Crimes Incident Handling Ethics