:. Sprint IT Solutions .: | Cyber Security
12454
page-template,page-template-full_width,page-template-full_width-php,page,page-id-12454,ajax_fade,page_not_loaded,,qode-theme-ver-2.7,wpb-js-composer js-comp-ver-5.4.7,vc_responsive

Best Cyber Security Online Training In USA

COURSE CONTENT :

Security Concepts and Mechanisms

Networking Concepts Overview

  • Basics of Communication Systems
  • Transmission Media
  • ISO/OSI and TCP/IP Protocol Stacks
  • Local Area Networks
  • Wide Area Networks
  • Internetworking
  • Packet Formats
  • Wireless Networks
  • The Internet

Information Security Concepts

  • Information Security Overview
  • Information Security Services
  • Types of Attacks
  • Goals for Security
  • E-commerce Security
  • Computer Forensics
  • Steganography
  • Security Engineering

Security Threats and vulnerabilities

  • Overview of Security threats
  • Hacking Techniques
  • Password Cracking
  • Insecure Network connections
  • Malicious Code
  • Programming Bugs
  • Cyber crime and Cyber terrorism
  • Information Warfare and Surveillance

Cryptography

  • Introduction to Cryptography
  • Symmetric key Cryptography
  • Asymmetric key Cryptography
  • Message Authentication and Hash functions
  • Digital Signatures
  • Public Key infrastructure
  • Diffe-Hellman key exchange proptocol
  • Applications of Cryptography

Security Management

Security Management Practices

  • Overview of Security Management
  • Information Classification Process
  • Security Policy
  • Risk Management
  • Security Procedures and Guidelines
  • Business Continuity and Disaster Recovery

Security Laws and Standards

  • Security Assurance
  • Security Laws
  • International Standards
  • Security Audit
  • OCTAVE approach
  • SSE-CMM 3

Network Security

Access Control and Intrusion Detection

  • Overview of Identification and Authorization
  • I & A Techniques
  • Overview of IDS
  • Intrusion Detection Systems and Intrusion Prevention Systems

Server Management and Firewalls

  • User Management
  • DNS Routing and Load Balancing
  • Overview of Firewalls
  • Types of Firewalls
  • DMZ and firewall features

Security for VPN and Next Generation Networks

  • VPN Security
  • Security in Multimedia Networks
  • Fax Security
  • Link Encryption Devices

System and Application Security

Security Architectures and Models

  • Designing Secure Operating Systems
  • Controls to enforce security services
  • Information flow model and Biba model

System Security

  • Desktop Security
  • email security: PGP and SMIME
  • Web Security: web authentication, SSL and SET

OS Security

  • OS Security Vulnerabilities, updates and patches
  • OS integrity checks
  • Anti-virus software
  • Design of secure OS and OS hardening
  • Configuring the OS for security
  • Trusted OS