Certified Security Specialist
0(0 Ratings)

About Course
This course will benefit students who are interested in learning the fundamentals of information security, network security, and computer forensics. t enables students to identify information security threats which reflect on the security posture of the organization and implement general security controls. This program will give a holistic overview of the key components of information security, computer forensics, and network security. This program provides a solid fundamental knowledge required for a career in information security.
*The sessions will impart in English Language.
What I will learn?
- Upon Completion of this Course, you will accomplish following:-
- Key issues plaguing the information security, network security, and computer forensics
- Fundamentals of networks and various components of the OSI and TCP/IP model
- Various types of information security threats and attacks, and their countermeasures
- Identification, authentication, and authorization concepts
- Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
- Fundamentals of IDS and IDS evasion techniques
- Data backup techniques and VPN security
- Fundamentals of firewall, techniques for bypassing firewall, and firewall technologies
- such as Bastion Host, DMZ, Proxy Servers, Network Address Translation, Virtual Private
- Network, and Honeypot
- Social engineering techniques, identify theft, and social engineering countermeasures
- Different stages of hacking cycle
- Various network security protocols
- Wireless Encryption, wireless threats, wireless hacking tools, and Wi-Fi security
- Different types of web server and web application attacks, and countermeasures
- Fundamentals of ethical hacking and pen testing
- Incident handling and response process
- Cyber-crime and computer forensics investigation methodology
- Different types of digital evidence and digital evidence examination process
- Different type of file systems and their comparison (based on limit and features)
- Steganography and its techniques
- Different types of log capturing, time synchronization, and log capturing tools
- E-mails tracking and e-mail crimes investigation
- Writing investigation report
- Gathering volatile and non-volatile information from Windows and network
- forensics analysis mechanism
₹35,000
Hi, Welcome back!
Since it is instructor led training, the batch will be schedule on demand. Aspirants are welcome!!
Tags
Requirements
- Basic Computer Knowledge.
Target Audience
- This course will benefit students who are interested in learning the fundamentals of information security, network security, and computer forensics.