COURSE OBJECTIVE:
• Key issues plaguing the information security, network security, and computer forensics
• Fundamentals of networks and various components of the OSI and TCP/IP model
• Various network security protocols
• Various types of information security threats and attacks, and their countermeasures
• Social engineering techniques, identify theft, and social engineering countermeasures
• Different stages of hacking cycle
• Identification, authentication, and authorization concepts
• Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
• Fundamentals of firewall, techniques for bypassing firewall, and firewall technologies such as Bastion Host, DMZ, Proxy Servers, Network Address Translation, Virtual Private Network, and Honeypo
• Fundamentals of IDS and IDS evasion techniques
• Data backup techniques and VPN security
TARGET AUDIENCE:
This course will benefit students who are interested in learning the fundamentals of information security, network security, and computer forensics.
COURSE PREREQUISITES:
Not available. Please contact.
COURSE CONTENT:
• Information Security Fundamentals
• Networking Fundamentals
• Secure Network Protocols
• Information Security Threats and Attacks
• Social Engineering
• Identification, Authentication, and Authorization
• Cryptography
• Firewalls
• Intrusion Detection System
• Data Backup
• Virtual Private Network
• Wireless Network Security
• Web Security
• Ethical Hacking and Pen Testing
• Incident response
• Computer Forensics Fundamentals
• Digital evidence
• Understanding File Systems
• Windows forensics
• Network Forensics and Investigating Network Traffic
• Steganography
• Analyzing logs
• E-mail Crime and Computer Forensics
• Writing Investigative Report
FOLLOW ON COURSES:
Not available. Please contact.