Over

120,000

Worldwide

Saturday - Sunday CLOSED

Mon - Fri 8.00 - 18.00

Call us

 

IT security principles and practices MasterClass


by admin09
Free
7 Lessons
0 Students

COURSE OBJECTIVES

This course teaches the principles and techniques of security threats and vulnerabilities. Delegates will also learn how to:

  1. Design network and implement security measures, procedures
  2. Conceive various security policies
  3. Conduct network penetration testing
  4. Plan data and disasters recovery guidelines

LEARNING OUTCOMES

Upon successful completion of this course, the delegate will be able to:

  1. Be able to design a secure system.
  2. Understand and explain the standard cryptographic tools
  3. Implement encryption and decryption algorithms DES, 3DES, AES, …
  4. Enforce authentication, confidentiality, authorization, access control, and confidentiality procedures.
  5. Apply apache, and IIS web servers’ security policies.
  6. Create digital certificates and enable SSL for critical web pages.
  7. Build security associations for the IPSEC protocol security authentication methods.
  8. Understand and evaluate security vulnerabilities in different type of software to avoid sever attacks like the SQL injections, cross site scripting, and buffer overflow.

 

Lessons

Cluster2: Security Technology and Principles

  What is cryptography Classical Cryptosystems Transposition Cipher Substitution Cipher Symmetric Encryption, DES,3DES, AES Message, Authentication and Hash Function, Problems Solving Public Key Cryptography RSA, DH, ECC, DSA Digital Signatures and  […]

Cluster 5: Internet Authentication Applications

   Kerberos X509 Public Key Infrastructure User Authentication Password based Token based Biometric Challenge Response Transport-Level Security (SSL/TLS) Electronic Mail Security (S/MME, PGP) IP Security (IPsec) Problems solving (IPsec, SSL)

Cluster 6: Projects proposal

  Network and Application Vulnerabilities Denial of Service IP spoofing Session Hijacking Sniffing Firewalls, IPS and IDS Firewall Characteristics

Cluster 7: SOFTWARE SECURITY

  Malwares classifications Handling Buffer Overflow Writing programs reflecting buffer overflow attacks Programming techniques preventing buffer overflow attacks. SQL Injection, Cross Site Scripting XSS Intruders     Summary of the course […]
This course focuses on the underlying concepts of Network, computer systems security and information protection. It enables the delegate to discover the nature of Network and computer security, threats, and vulnerabilities, assessing the risks, developing computer security policy, communications and network security, disaster recovery, computer viruses. Topics include Block Ciphers, Data Encryption Standard (DES algorithm), Public-Key Cryptography, RSA algorithm, Authentication Protocols(SSL, KERBEROS), Message Authentication, Authentication Application, hash functions, Digital Signatures, Electronic Mail Security, IP Security IPsec, Web Security, Malicious Software and Firewalls
ABOUT US

All you need to feel prepared for your exams, with the confidence to succeed. All you need to feel prepared for your exams succeed.

All you need to feel prepar
ed for your exams, with the confidence to succeed. All you need to feel

BUY THIS THEME

CONTACT US

Skilled is also likely to be focused on fast and bright teaching, it's a great type of courses to...
  • The Aislin Themes Inc. Best Avenue 16-2, CA 23653, USA
  • +1 998 71 150 30 20
  • +1 998 71 150 30 22
  • info@aislinthemes.com
WORKING HOURS

  • Monday9am - 6pm
  • Tuesday9am - 6pm
  • Wednesday9am - 6pm
  • Thursday9am - 6pm
  • Friday9am - 6pm
  • SaturdayClosed
  • SundayClosed