Become a Network Security Specialist – Go from a beginner to a pro in this easy-to-follow expert course. Learn the practical skill-set in defeating all online threats, including – advanced hackers, trackers

Description

  • Fundamentals of Java programming
  • Understanding the principles of OOP
  • Basic knowledge in XML/JSON
  • Supplemental Resources
  • Lifetime access
  • Access on Mobile Phones
  • Certificate of Completion

Gain a stable foundation in Information security as well as prepare for the industry’s most sought after entry level certification.

Information Systems Access Control

  • Introduction to Access Control
  • Authorization and Authentication
  • Single Sign On
  • Central Administration (RADIUS)
  • Access Control Attack
  • Intrusion Detection System
  • Penetration Testing
END-of-the TOPIC ASSESSMENT
Security Architecture and Design

  • Common Security Architecture Frameworks
  • Trusted Computing base
  • Security Models
  • TCB Vulnerability
  • Security Mode Types
  • TCSEC Protocols
  • Information Systems Security Standard
END-of-the TOPIC ASSESSMENT
Network and Telecommunications Security

  • The OSI Model
  • TCP/IP Model
  • Network Architecture Components
  • Firewall
  • Network Types and Topolgies
  • Remote Access Technology
  • Wireless Network
  • Network Attacks
  • Remote Access Security Mechanisms
  • RAID
  • Backup
END-of-the TOPIC ASSESSMENT
Information Security Classification and Program Development

  • Classification Schemes
  • Security Document Types
  • Security Awareness and Training
Cryptography

  • Cryptography
  • Alternative Ciphers
  • Symmetric Encryption
  • Asymmetric Encryption
  • Hashing
  • Digital Signatures
  • Secure Sockets Layer (SSL) and Transport layer security (TLS)
  • SSL Stripping
  • HTTPS (HTTP Secure)
  • Digital Certificates
  • Certificate Authorities and HTTPS
  • End-to-End Encryption (E2EE)
  • Steganography
  • How Security and Encryption is Really Attacked
END-of-the TOPIC ASSESSMENT
Physical Security, Operations Security, Business Continuity and

Disaster Recovery Planning

  • What Is Physical Security?
  • Physical Access Barriers
  • Power Issues
  • Fire
  • Operations Security
  • Operations Security Control Methods
  • Business Continuity Plans
  • Business Impact Analysis
  • MTD/RTO/RPO
  • Disaster Recovery Plans
  • Alternate Sites
END-of-the TOPIC ASSESSMENT
Application Security

  • The System Life Cycle
  • Software Escrow
  • Software Development Methods
  • The Change Control Process
  • Security Consideration
  • What is SQL Injection ?
  • SQL Injection attack
  • Software Control
END-of-the TOPIC ASSESSMENT
Attacks

  • Brute Force Attacks
  • Phishing
  • Bots and Botnets
  • DoS and DDoS
  • Pings
  • Man in the Middle Attacks
Malware

  • Viruses and Worms
  • Trojans
  • Adware and Spyware
  • Ransomare
  • Other types of Malware
Defence Mechanisms

  • Anti Virus
  • Encryption
  • Firewalls
  • Biometrics
  • Factor Authentication Methods
  • Honey Pots and DMZs
  • Security for Wireless Networks
  • Password Management
END-of-the TOPIC ASSESSMENT
Ethical Hacking

  • Footprinting/ Reconnaissance
  • Scanning
  • Enumeration
  • Sniffing
  • Denial of Service
  • Web Server Hacking
  • Spoofing/Phishing
  • Password Cracking
  • Database Hacking

 

END-of-the TOPIC ASSESSMENT
Cyber Warfare and Cyber Attacks Against Companies – An Exemplified Overview
End of Course ASSESSMENT