Duration

30 Hours(For Regular Course)

4-8 Hours(For Capsule Course)


Enroll Now

Request more information




Security Essentials Boot camp Style

This web-based training course on Security Essentials Boot camp Style functionality, administration and development, is available online to all individuals, institutions, corporates and enterprises in India (New Delhi NCR, Bangalore, Chennai, Kolkatta), US, UK, Canada, Australia, Singapore, United Arab Emirates (UAE), China and South Africa. No matter where you are located, you can enroll for any training with us - because all our training sessions are delivered online by live instructors using interactive, intensive learning methods.

When it comes to network and systems security for preventing attacks, detecting adversaries and using actionable techniques to mitigate the adversaries, there are certain essentials to have in terms of knowledge base and hands on techniques. In order to be proficient in such security essentials, professionals must understand how organization's networks get compromised and how the proper security metrics can be set up and deployed in order drive security decisions. It involves the various methods of analyzing and assessing the risk to the environment to create a security road map along with the creation of right security solutions on those paths. The entire security essentials course focuses on the creation of a proper and standardized security program based on the path of prevention-detection-response. The course is based on the idea that "prevention is preferred but detection is imperative."


This Security essentials online training course provides the trainees with the essential information security skills and capabilities which are required to protect the critical and sensitive information assets and business systems. Through this security essentials training course you will be able to design and build secure systems using VLANs, NAC, 802.1x etc. The various Linux command line tools along with basic scripting tools for automation will be detailed about along with the methods of continuously monitoring these tools. The methods of creating virtual machines and labs for testing tools and security systems will also be talked about along with the identification of the weaknesses which are detected through the tests. This security essentials online course has no pre-requisites but it will be beneficial if the students have a working knowledge of information security and networking to keep pace with the course.


Lab Setup Using Virtual Machines

  • Uses
  • Implementations
  • Security Services

Fundamentals Of Network

  • Types Of Network
  • Topologies Of Network
  • Protocols Of LAN
  • Protocols Of WAN
  • Devices For The Network

Concepts Of IP

  • Packets And Addresses
  • Service Ports Of IP
  • Protocols Of IP
  • TCP
  • UDP
  • ICM
  • DNS

Behavior Of IP

  • TCP Dump
  • UDP
  • ICMP
  • Behavior Of UDP

Foundations Of Information Assurance

  • In-Depth Defense Fundamentals
  • Risk Models
  • Authentication Vs. Authorization
  • Vulnerabilities And Their Detection

Policies Of Computer Security

  • Well Written Elements
  • Policies As Insurance
  • Roles And Responsibilities

Planning Contingency And Continuity

  • Business Continuity Planning (BCP)
  • Disaster Recovery Planning (DRP)
  • Analysis Of Business Impact

Controlling Access

  • Classification Of Data
  • Authentication, Authorization, Accountability (AAA)
  • MAC And DAC

Management Of Passwords

  • Cracking Password In Windows And Unix
  • Alternate Authentication Forms
  • Single Sign-On
  • RADIUS

Incident Response (IR)

  • Preparation, Identification, And Containment
  • Eradication And Recovery
  • Techniques Of Investigation
  • Legal Issues With IR

Information Warfare In Offense And Defense (IW)

  • IW Types
  • APT
  • Asymmetric Warfare
  • Goals Of Offense

Strategies And Methods Of Attack

  • Breaking Into Systems
  • Mitnick Attack
  • Methods Of Attack

Vulnerability Scanning And Remediation

  • Remediation Methods
  • Network Visibility Map
  • Identification Of Host
  • Scanning Of Port
  • Scanning Vulnerabilities
  • Penetration Testing

Security Of The Web

  • Communication Over The Web
  • Protocols Of Web Security
  • Active Content
  • Cracking Of Web Applications
  • Defenses In Web Application

Firewalls And Perimeters

  • Firewalls Types
  • Pros And Cons Of Firewalls
  • Placement Of Firewall
  • Packet Filtering, Stateful, And Proxies

Honeypots

  • Forensics
  • Honeypots
  • Honeynets
  • Honey Tokens
  • Protection Based On Host

  • Intrusion Detection
  • Intrusion Prevention
  • Tripwire

Intrusion Detection And Prevention Based On Network

  • Strategies Of Deployment
  • Snort Usage
  • Development And Advances

Cryptography

  • Cryptography Usage
  • Encryption Types
  • Symmetric
  • Asymmetric
  • Hash
  • Ciphers
  • Digital Substitution
  • Algorithms
  • Cryptosystems In The Real-World
  • Crypto Attacks
  • Vpns
  • Types Of Remote Access
  • PKI
  • Digital Certificates
  • Key Escrow

Steganography

  • Types
  • Applications
  • Detection

Critical Security Controls

  • Introduction Of Controls
  • Implementation Of Controls
  • Auditing Of Controls
  • Controls And Metrics

Assessment And Auditing Of Risks

  • Methodologies Of Risk Assessment
  • Approaches In Risk Assessment
  • Risk Calculation
  • SLE
  • ALE

Infrastructure Of Security

  • Windows Operating Systems Family
  • Local Accounts And Workgroups
  • Active Directory Introduction
  • Users And Groups In The Domain
  • Kerberos, Ntlmv2, Smart Cards
  • Forests And Trusts
  • Group Policy

Service Packs, Patches, And Backups

  • Service Packs
  • Security Bulletins Emailing
  • Installation Of Patch
  • Automated Updates
  • Server Update Services On Windows
  • Backing Up Windows
  • Restoring Systems
  • Device Driver Rollback

Permissions And User Rights Implementation

  • Permissions Of NTFS
  • Sharing Service For File And Print
  • Shared Folders
  • Encryption Of Bitlocker Drive

Security Policies And Templates

  • Objects Of Group Policy
  • Policies For Password
  • Policies For Lockout
  • Anonymous Access
  • Policies Of Software Restriction

Network Services Security

  • Firewalls And Packet Filtering
  • Ipsec And Vpns
  • Wireless Networking
  • Security Configuration Wizard
  • Remote Desktop Protocol (RDP)

Auditing And Automation

  • Security Analyzer Of Microsoft Baseline
  • SECEDIT.EXE
  • Event Logs In Windows
  • NTFS And Registry Auditing
  • IIS Logging
  • System Baselines Creation
  • Tools Of Scripting
  • Jobs Scheduling

Landscape Of Linux

  • Varieties And Uses Of Linux
  • Methods Of Starting Processes
  • Information Of Network Interface
  • Processing Information
  • Hierarchy In The Directory

Permissions And User Accounts

  • Permissions Setup
  • SUID And SGID
  • Access Control
  • Root And. User Accounts
  • Password Controls
  • Pluggable Authentication Module (PAM)

Security Of Linux OS

  • Running And Stopping Programs
  • Changes In Configuration And Restarting Services
  • Permissions In File System, Ownership, And The Systems
  • Mounting Drives

Maintenance, Monitoring, And Auditing Of Linux

  • Patching
  • Data Backing Up
  • Syslog
  • Log Files Analysis
  • Other Logging

Tools For Linux Security

  • File Integrity Verifications
  • Chkrootkit
  • CIS Hardening
  • Bastille Linux
  • Sniffers
  • Snort

This course involves a variety of security essentials which are needed in almost all domains of cyber and information security. It does not focus on a particular specific domain but completing this course will provide the trainees with immense value addition to their work and help them grow their career at a fast pace and open more door in the industry for them. The versatile and varied nature of this course is aimed to provide the trainees with a wider perspective of what all can be achieved in the domain and the places they can reach. This course comes highly recommended for security professionals, managers, operation personnel, IT engineer, administrators, forensic analysts and virtually any professional working in security and network administration.

1. Are lab-sessions available after theory sessions?

We provide online lab facilities to all our students, wherever possible & applicable, using a combination of one or more options, including global ASP setups, live-environments, real-time simulations, training-videos, PPTs, Screenshots and others.

2. Who and how qualified are the instructors?

All our instructors go through a rigorous and multiple processes of filtering and selection before they are appointed by us. Only the most qualified, most experienced and best suited candidates are chosen as instructors.

3.What are the machine requirements for the course?

You must have a fairly good desktop PC or laptop. You can even access these courses on your tabs or smart phones. For PCs and laptops the configuration should be at-least an Intel Pentium processor, 4GB of RAM and 50 to 100 GB of free hard disk space. You must also have a good and steady WiFi internet connection which works at 3G or 4G speeds.

4.How will I undergo practical training in the course?

Depending on the type of lab facilities available for the course you have enrolled in for our instructor would be happy to help you in your lab sessions.

5.What is the process to get my questions/queries answered?

Get in touch with your trainer. You can also consult your batch-mates. We believe in collaborative and practical learning.

6.Can a free demo session be provided?

We do not provide free demo sessions.

7.Will there be a provision for repetition if I miss a class?

We encourage our trainees to attend all sessions. If you have missed a session we will try out best to update you on it, if possible. Else you will need to pay a small fee to have a repeat session arranged specifically for you.

8.Does your organization provide assistance in job hunting?

We are connected across the industry in India and abroad. We will pass on any job openings from our customer to our trainees. But we are not a manpower placement provider.

9.How and where can I make the payment?

You can pay using any credit or debit card in India or abroad. You can also pay using your PayPal account.

10. Will practice material or tests be also provided with the course?

Yes. As required & as applicable.

11.What is the minimum or maximum batch size?

Minimum/maximum batch sizes vary from course to course, depending upon a number of factors. It can vary from as few as 2 to as many as a few hundred, in some cases. But that number does not impact the quality of training that we deliver due to our tight quality-control mechanisms.

All trainees will be provided with a course participation and completion certificate by Aurelius Corporate Solutions. Please note, we are an independent provider of learning solutions. We are not affiliated in any manner to any company or organization.

Copyright © 2016 Aurelius Corporate Solutions Pvt. Ltd. All Rights Reserved.