Network Security Course
Certificate
In Delhi
Description
-
Type
Certificate
-
Location
Delhi
-
Duration
60 Days
-
Start date
Different dates available
Delhi Institute of Computer Courses (DICC) offers network security course that would enable the students to learn with practical that how they really protect or hack the different networks. Securing the networks from hackers is one of the major requirements of any company today and there is lot of demand and career opportunities for network security experts. Go through the Course details of Network Security course as below:.
Facilities
Location
Start date
Start date
Reviews
Subjects
- Network security
- IT
- Cyber Law
Teachers and trainers (1)
Delhi Institute of Computer Courses (DICC)
Trainer
Course programme
Chapter 2 - Understanding Network Topology
Chapter 3 - Open Systems Interconnectivity Model
Chapter 4 - TCP/IP In-depth
Chapter 5 - Understanding WAP, NAT, DNS and ICMP
Chapter 6 - Internet Routing
Chapter 7 - Advanced Port Scanning
Chapter 8 - Advance Sniffing
Chapter 9 - Masquerading Attacks
Chapter 10 - DOS and DDOS(Denial of Services)
Chapter 11 - Network Operations Center - Security
Chapter 12 - Network Traffic Analysis and Reporting
Chapter 13 - Vulnerability Assessment
Chapter 14 - Penetration Testing
Chapter 15 – Understanding the Intrusion Detection System (IDS)
Chapter 16 - Snort 101,
Chapter 17 - OSSEC 102
Chapter 18 - Understanding the Intrusion Prevention System (IPS)
Chapter 19 - Firewalls (How to install, configure and Use Firewalls)
Chapter 20 – Operating System Hardening for Networks - Linux & Windows
Chapter 21 - Advance Cryptography
Chapter 22 – Understanding Symmetric Key Encryption
Chapter 23 - Understanding Asymmetric Key Encryption
Chapter 24 - Understanding Hash functions
Chapter 25 - Trust models
Chapter 26 - VLAN - Security
Chapter 27 - VPN - Security
Chapter 28 - Wireless Networks
Chapter 29 - Radio Frequency Essentials
Chapter 30 - Wireless Security
Chapter 31 - Threats to Wireless
Chapter 32 - Attacking Wireless Hotspot and Security
Chapter 33 - WEP Security
Chapter 34 - WPA/WPA2 Security
Chapter 35 - Secure Wireless Infrastructure Deployment
Chapter 36 – Overview of DNS Tunneling
Chapter 37 – Concept of Network Forensic Methodology
Chapter 38 - Concept of Network Evidence Acquisition
Chapter 39 - OS Logs and Splunk
Chapter 40 - Summary
Network Security Course