Fundamentals of Information Security Training

 

COURSE ID

GES-IS
DURATION 39 hrs
DELIVERY METHOD Classroom Instructor-led training (CILT)
Online Instructor-led training ( OILT)
COURSE OVERVIEW Candidates can appear for CompTIA Security+ certification after completion of the course.
PREREQUISITES Candidate should have bachelor degree or college diploma. Candidate should have basic knowledge in SQL and Networking. Candidate should have good communication and writing skills.
Fundamental in Information Security

1.Network Security
Firewalls
Proxies
Reverse Proxies
Network Address Translation
VPN Concentrators
Network Administration Principles
Subnetting
Subnet Mask
Network Design Elements and Components
TCP .IP Internet Protocol
Common Protocols and Their Port Numbers
TCP .IP Internet Protocol
Security Related Issues: Wireless Network
TCP/IP Certification
Tools:Windows firewall,ipsec

2.Complaince and Operational Security
Risk Related Concepts
Control Types
The Principle of Least Privilege
Security Implications of Integrating Systems
Basic Forensic Procedures
Incident Response Procedures
Importance of Security
Importance of Security Awareness and Training
Physical Security and Environmental Controls
Risk Management Best Practices
Goals of Security
Application, Data and Host Security
Access Control and Identity Management
Cryptography
Phishing
Various Types of Attacks
Social Engineering
Types of Wireless Attacks
Application Attacks
Attacks (LDAP ,XML) Injection
Zero Day Exploits, Cookies and Attachments
Tools:Metasploit,Knowbe4me and more

3.Threats and Vulnerabilities
Penetration Testing vs Vulnerability Scanning
Types of Malware
Mitigation and Deterrent Techniques
Security Traits and Vulnerabilities
Assessment Techniques
Tools:Kali linux,Openvas,OWASPZAP and more

4.Application Data and host security
Host Security
Hardware Security
Virtualization
Importance of Data Security
Data Security
Data Encryption
Data Policies
ToolsL:Lynis,CIS tools,OpenVAS and more

5.Access control and Identity Management
Host Security
Authentication Services
Access Controls
Authentication Authorization and Access Control
Authentication Factors
Implementing Appropriate Security Controls When Performing Account Management
Best Practices For Account Management1
Access Control and Identity Management Certification
Tools:Linux read,write and more

6.Cryptography
General Cryptography Concepts05:41
Block Cyphers & Stream Cyphers02:08
Transport Encryption02:19
Hashing & Steganography
WEP, WPA and WPA2
MD5, SHA and AES0
DES, HMAC and CHAP
Public Key Infrastructure
Tools:Snow and more

7. IDS
Tools:Snort

popular courses
Fundamentals of Information Security Training
QA view

Fundamentals of Information Security Training
.net view

Fundamentals of Information Security Training
Java view
Oracle view
Fundamentals of Information Security Training
Sap view

Recent comments

Navneet

"Globalerp solutions is very good institute provided good Fundamentals of Information Security training. Also provided placement opportunities in companies. Thanks a lot...."

Raj

"Best faculty you can ever get. Provided all real-time scenarios and also taught full Fundamentals of Information Security end to end implementation. "

Rajasri

"i recommend Globalerp solutions training to everyone who would like to take course in Montreal. "