Network Security

Network security, attacks on ARP, TCP/IP, DNS, & BGP protocols; Sniffing/Spoofing; Firewall; VPN; How the Internet works
For IT & Computer science Engineers

Course Type

alternative

₹ 18060  

What You'll Learn ?

Network Security Fundamentals and Objectives
Recognizing Network Threats and Attacks
Developing Network Security Policies
Protection of Network Foundation
Control Plane, Data Plane, and Management Plane
CCP for Router Communication and Audit
Securing the Management Plane with AAA
Router Passwords, Access Control, Logging
VLANs, Spanning-Tree, Layer 2 Security
Access-Lists, Firewall, IDS/IPS, VPN Technology

Description

Course Description
Network security is concerned with granting access to a network to the authorized users, and denying access to a network by the unauthorized users.
It encompasses the actions to prevent attacks from viruses, worms, and Trojan horses; spyware and adware; zero-day/zero-hour attacks; hacker attacks; denial of service attacks; data interception and theft, and identity theft. A network security consists of many hardware and software components.

Course objectives
identify some of the factors driving the need for network security
identify and classify particular examples of attacks
define the terms vulnerability, threat and attack
identify physical points of vulnerability in simple networks
compare and contrast symmetric and asymmetric encryption systems and their vulnerability to attack, and explain the characteristics of hybrid systems.

Roles in industry
Major job providers for network security professionals are financial institutions and banks, internet service providers, pharmaceutical companies, government and defense agencies, and multinational corporations. Administrator - Network & Security, Network Security Engineer, Technology Expert - Network Security, Network Security Analyst, Network Security Specialist, and Network Security Manager are some of the popular job openings in this domain.

Course Highlights
Fundamentals of Network Security & types of Security Threats
Securing Management Plane - AAA using ACS Server, RBAC
Firewall Technologies - Zone based firewall
Adaptive Security Appliance(ASA)
IPsec Site-to-site VPN and Remote Access VPN ‒ Clientless and AnyConnect VPN
Layer 2 attacks - Port Security, VLAN Security and Mitigation Procedures
Intrusion Prevention System Deployment
Email-based and Web based threats