CYBER SECURITY AND NETWORK SECURITY COURSES

Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. By increasing network security, you decrease the chance of privacy spoofing, identity or information theft and so on. Also Cyber Security is of growing importance due to the increasing reliance on computer systems and the Internet in most societies, wireless networks such as Bluetooth and Wi-Fi – and the growth of “smart” devices, including smartphones, televisions and tiny devices as part of the Internet of Things.

 

TCP / IP Fundamentals the founding blocks for any information security professional (Duration: 5 hrs)

  • Module 1: Introduction to TCP/IP
  • Module 2: Features of TCP/IP
  • Module 3: Protocol Standards
  • Module 4: TCP / IP Protocol Architecture

 

Network Security (Duration: 20 hrs)

  • Module 5: Secure Network design
  • Module 6: DMZ
  • Module 7: VLANs
  • Module 8: Firewalls
  • Module 9: IDS/IPS
  • Module 10: WLAN Security
  • Module 11: VPNs
  • Module 12: Telecommunications
  • Module 13: Types and Sources of Network Threats

 

Operating System Security (Duration: 10 hrs)

  • Module 14: Security Fundamentals
  • Module 14.1: Windows
  • Module 14.2: UNIX
  • Module 14.3: Solaris

 

Database Security (Duration: 10 hrs)

  • Module 15: Oracle
  • Module 16: MS SQL

 

Ethical Hacking (Duration: 8 hrs)

  • Module 17: Network Cartography
  • Module 18: Exploitation
  • Module 19: Social Engineering
  • Module 20: Honey Pots
  • Module 21: Password Cracking
  • Module 22: Esoteric Hacking
  • Module 23: Cryptography
  • Module 24: Hands On

 

Digital Forensics (Duration: 10 hrs)

  • Module 25: Hacking Incidents
  • Module 26: Defining Forensics Process
  • Module 27: Digital Forensics Essentials – The six A’s
  • Module 28: Preserving the Chain of Custody
  • Module 29: Disk Based Forensics V/s Network Based Forensics
  • Module 30: Training on Encase and advanced digital forensics techniques.

 

Network Security with Checkpoint (Duration: 40 hrs)

Introduction to Checkpoint Technologies

  • What’s new in checkpoint R77.30
  • Checkpoint’s Architecture
  • Implementing 3 tier Architecture of checkpoint

 

Deployment Platforms

  • Checkpoint supported platforms
  • Installing Checkpoint on Windows o/s
  • Installing Checkpoint on GAiA
  • Configuring checkpoint in standard setup
  • Configuring checkpoint in distributed setup

 

Introduction to Security policy

  • Understanding Checkpoint Licensing
  • VerifySIC establishment between the Security Management Server and the
  • Gateway using Smart Dashboard
  • Creating a basic Rulebase
  • Implicit rules vs Explicit rules
  • Configuring hide NAT
  • Configuring Static NAT
  • Configuring PAT & Port Redirection

 

User management & Authentication

  • Configure user & group accounts in checkpoint
  • Configure policies for authentication
  • Local Authentication Methods
  • Configuring user authentication
  • Configuring Session authentication
  • Configuring Client Authentication

 

External Authentication

  • Creating LDAP & TACACS+ objects
  • Integrating active directory server with checkpoint gateway
  • Configuring Tacacs+ server
  • Integrating Tacacs+ server with checkpoint gateway
  • Integrating Radius Server

 

Identity Awareness

  • Introduction to Identity Awareness
  • Configuring Identity Awareness
  • Using Identity awareness to provide access to network resource

 

Checkpoint VPN Introduction

  • Understanding VPN terminology
  • Understanding IKEv2
  • Understanding Phase-1& Phase-2
  • Implementing site-to- site vpn with head office & Branch office

 

Monitoring

  • Using smartview tracker for Analyzing logs
  • Using smartview Monitor for monitoring traffic
  • Using queries in smartview tracker
  • Filtering logs in smartview tracker

 

Smart Update

  • Monitor remote Gateways using Smart Update
  • Patch Management
  • Manage New installations
  • license modifications
  • Upgrading Checkpoint Gw’s & Management server using Smart update

 

Security Administration with ArcSight (Duration: 20 hrs)

  • Module 1: ESM CORRE 6.5 Architecture
  • Module 2: Installing ESM CORRE 6.5
  • Module 3: Installing and Navigating the ESM Console
  • Module 4: Using CORRE with ArcSight Appliances
  • Module 5: Installing Connectors
  • Module 6: Managing ArcSight SmartConnectors
  • Module 7: Using the Management Console Browser Interface
  • Module 8: Real-time Event Flow Using the ESM Console
  • Module 9: Managing the Network Model
  • Module 10: Installing FlexConnectors
  • Module 11: ArcSight Forwarding Connectors
  • Module 12: Configuring Notifications
  • Module 13: Managing SSL Certificates
  • Module 14: Maintaining Lists and Trends
  • Module 15: ArcSight Web and the Command Center
  • Module 16: Event Management
  • Module 17: ArcSight ESM Admin Authentication
  • Module 18: Maintaining CORRE System Health
  • Module 19: Using ArcSight Packages
  • Module 20: Patching CORR-Engine
  • Module 21: ArcSight ESM CORRE Backup and Restore
  • Module 22: Managing CORRE Daily Partitions
  • Module 23: Working with HP ArcSight Support

 

Specific Trainings (Duration depends on client requirement, it may vary in between 25 to 40 hrs)

  • Cisco
  • F5
  • Checkpoint
  • Citrix
  • Fortinet
  • Cisco ACE
  • Palo Alto
  • Cyberoam
  • Sonicwall
  • CISSP
  • CISA
  • CISM
  • ISO 27001