GET TRAINED GET CERTIFIED GET PLACED. Certified Linux & Security Professionals in High Demand Globally MASK365 KNOWLEDGE CENTRE

Size: px
Start display at page:

Download "GET TRAINED GET CERTIFIED GET PLACED. Certified Linux & Security Professionals in High Demand Globally MASK365 KNOWLEDGE CENTRE"

Transcription

1 GET TRAINED GET CERTIFIED GET PLACED Certified Linux & Security Professionals in High Demand Globally CERTIFIED TRAINING PARTNER MASK365 KNOWLEDGE CENTRE 132 Bhagwandeen Nagar, Behind INOX Sapna Sangeeta Indore Ph: [email protected]

2 OUR GOAL To Provide quality training and platform for aspiring students, through globally recognised Trainings & Certifications from Red Hat and EC- Council with the help of what we have learned through our Knowledge & Experience. ABOUT MASK365 KNOWLEDGE CENTRE MASK365 Knowledge Centre is an initiative of Pisces Solutions Private Limited. Pisces Solutions was founded in 2002 as an IT Consulting firm in the field of Networking Solutions and Cyber Security. It has implemented various projects in India, Middle East & China entirely based on Linux as a Platform. Pisces Solutions became a Private Limited company in 2014 and stepped into education in 2015 by becoming Red Hat Certified Training Partner and EC-Council Accredited Training Centre under the name of MASK365 Knowledge Centre. Pisces Solutions Private Limited is also the founder and creator of a MASK365 -UTM, a leading Firewall, Content Filtering and Security Appliance. ABOUT THE TRAINER Our Founder & Master Trainer Swapnil Jain has 16 years of industry experience in Networking, Linux & Security. He got his first certification in 1998 as Certified Novell Engineer during his 1st year of college and MCSE, CCNA, CCDA before completing graduation. He is also a Red Hat Certified Data Centre Specialist, Red Hat Certified Virtualization Administrator, Red Hat Certified OpenStack Administrator, Certified Ethical Hacker and Certified EC-Council Instructor. He is one of the few Red Hat Certified Architects in India who are also Red Hat Certified Instructors. He has travelled extensively around the world to implement various projects, attend conferences and trainings. His experience and expertise will be utilised to provide guidance and direction to the generation aspiring to create his or her career in the field of Information Technology.

3 TRAINING AND CERTIFICATION

4 RED HAT CERTIFIED SYSTEM ADMINISTRATOR [RHCSA] An IT professional who has earned the Red Hat Certified System Administrator (RHCSA) is able to perform the core system administration skills required in Red Hat Enterprise Linux environments. The credential is earned after successfully passing the Red Hat Certified System Administrator (RHCSA) Exam (EX200). COURSE OVERVIEW - PART I Access the command line Manage files from the command line Get help in Red Hat Enterprise Linux Create, view, and edit text files Manage local Linux users and groups Control access to files with Linux file system permissions Monitor and manage Linux processes Control services and daemons Configure and secure OpenSSH service Analyze and store logs Manage Red Hat Enterprise Linux networking Archive and copy files between systems Install and update software packages Access Linux file systems Use virtualized systems COURSE OVERVIEW - PART II Automate installation with Kickstart Use regular expressions with grep Create and Edit text files with vim Schedule future Linux tasks Manage priority of Linux processes Control access to files with access control lists (ACL) Manage SELinux security Connect to network-defined users and groups Add disks, partitions, and file systems to a Linux system Manage logical volume management (LVM) storage Access networked attached storage with network file system (NFS) Access networked storage with SMB Control and troubleshoot the Red Hat Enterprise Linux boot process Limit network communication with firewall Comprehensive review PREREQUISITES FOR THIS COURSE There are no formal prerequisites for this course; however, previous operating system administration experience will be very beneficial. COURSE DURATION - 72 Hours EXAM DURATION Hours

5 RED HAT CERTIFIED ENGINEER [RHCE] A Red Hat Certified Engineer (RHCE) is a Red Hat Certified System Administrator (RHCSA) who possesses the additional skills, knowledge, and abilities required of a senior system administrator responsible for Red Hat Enterprise Linux systems. The course is focused on deploying and managing network servers running caching Domain Name Service (DNS), MariaDB, Apache HTTPD, Postfix SMTP nullclients, network file sharing with Network File System (NFS) and Server Message Block (SMB), iscsi initiators and targets, advanced networking and firewalld configurations, and the use of Bash shell scripting to help automate, configure, and troubleshoot the system. Through lectures and hands-on labs, students who have already earned the RHCSA certification will be exposed to all competencies covered by the Red Hat Certified Engineer (RHCE) exam (EX300). AN RHCE IS CAPABLE OF RHCSA TASKS PLUS THE FOLLOWING: Configuring static routes, packet filtering, and network address translation Setting kernel runtime parameters Configuring an Internet Small Computer System Interface (iscsi) initiator Producing and delivering reports on system utilization Using shell scripting to automate system maintenance tasks Configuring system logging, including remote logging Configuring a system to provide networking services, including HTTP/HTTPS, File Transfer Protocol (FTP), network file system (NFS), server message block (SMB), Simple Mail Transfer Protocol (SMTP), secure shell (SSH) and Network Time Protocol (NTP) COURSE OVERVIEW Control services and daemons Manage IPv6 networking Configure link aggregation and bridging Control network port security Manage DNS for servers Configure delivery Provide block-based storage (iscsi) Provide file-based storage (NFS / SMB) Configure MariaDB databases Provide Apache HTTPD web service Write Bash scripts Bash conditionals and control structures Configure the shell environment Linux containers preview (Docker) Comprehensive review PREREQUISITES FOR THIS COURSE: RHCSA certification or equivalent experience COURSE DURATION - 32 Hours EXAM DURATION Hours

6 RED HAT LINUX TROUBLESHOOTING (RH242) In Red Hat Linux Troubleshooting (RH242), system administrators will learn techniques for troubleshooting a Linux system and how to use the troubleshooting tools available on Red Hat Enterprise Linux 6. COURSE OVERVIEW This course relates to Red Hat Enterprise Linux 6. It is a heavily lab-oriented class designed to help the student learn or improve troubleshooting skills. Students will gain troubleshooting experience by debugging live, virtualized systems. OUTLINE FOR THIS COURSE Proactively monitor log files, hardware, file systems, and system and network performance Several approaches to managing configuration changes and developing a recovery plan An introduction to troubleshooting methods, best practices, and tools Booting Issues, Use recovery runlevels and rescue mode; work with advanced GRUB features Hardware Issues, Preempting hardware failures (looking for the signs); protecting against hardware failures; redundant configurations; tools to help identify hardware failures and intermittent problems File System Issues, Locate unauthorized changes; audit software; file system tuning and repair; file recovery Disk Issues, Rescuing LVM volumes; maintenance of LUKS-encrypted volumes Networking Issues, Manual configuration of network cards; connectivity issues; network diagnostic tools; monitor packets; tune kernel parameters; troubleshoot SAN communication Application Issues, An overview of tools and techniques for troubleshooting applications; some common application problems and how to solve them Security Issues, Working effectively with (and not against) security tools, including SELinux, authentication, and firewall Red Hat Resources, Support options; Knowledgebase; certified training; initiating support calls; TAM support; developer support; Bugzilla; support workflow; diagnostic and information-gathering tools AUDIENCE FOR THIS COURSE Experienced Linux system administrators who have responsibilities that include troubleshooting their enterprise Linux environment. COURSE DURATION - 32 Hours

7 RED HAT CERTIFIED OPENSTACK ADMINISTRATOR [CL210] An IT professional who has earned the Red Hat Certified System Administrator in Red Hat OpenStack has demonstrated the skills, knowledge, and abilities needed to create, configure, and manage private clouds using Red Hat Enterprise Linux OpenStack Platform. Red Hat OpenStack Administration is one of our emerging technology courses. This series of courses focuses on Red Hat's evolving technologies. Emerging technology courses are feature-and functionality-focused and are conducted like guided labs. Through hands-on labs, students will explore fault-tolerant and redundant configurations of Red Hat Enterprise Linux OpenStack Platform, and will also look at the future plans of the OpenStack development community. COURSE CONTENT SUMMARY: Get an overview of the Red Hat Enterprise Linux OpenStack Platform architecture Install Red Hat Enterprise Linux OpenStack Platform using packstack Deploy each Red Hat Enterprise Linux OpenStack Platform service manually Manage users and projects Deploy instances, and use Heat to deploy and customize instances COURSE OVERVIEW Red Hat Enterprise Linux OpenStack Platform architecture Red Hat Enterprise Linux OpenStack Platform installation RabbitMQ message broker Keystone identity service Swift object storage service Glance image service Cinder block storage service Networking service Nova compute and controller services Implement an additional compute node Heat orchestration service Ceilometer metering service The future of the OpenStack development community Comprehensive review PREREQUISITES FOR THIS COURSE: Red Hat Certified System Administrator (RHCSA) or requisite level of knowledge highly recommended COURSE DURATION - 4 Days (8hr/day) EXAM DURATION - 3 Hours

8 RED HAT CERTIFICATE OF EXPERTISE IN SERVER HARDENING [RH413] An IT professional who has earned the Red Hat Certificate of Expertise in Server Hardening has demonstrated the knowledge, skills, and abilities needed to understand and apply standards-based best practices to secure Red Hat Enterprise Linux systems against unauthorized access. Many security policies and standards require systems administrators to address specific user authentication concerns, application of updates, system auditing and logging, file system integrity, and more. Red Hat Server Hardening provides strategies for addressing specific policy and configuration concerns. This course can also help you prepare for the Red Hat Certificate of Expertise in Server Hardening exam (EX413). COURSE OVERVIEW: Track security updates Manage software updates Allocate an advanced file system layout and use file system encryption. Adjust file system properties through security related options and file system attributes. Manage special permissions Manage additional file access controls Configure software to monitor the files on your machine for changes. Manage user accounts Manage pluggable authentication modules (PAMs) Apply changes to PAMs to enforce different types of rules on users. Secure console access Install central authentication Manage central authentication Configure system logging Configure system auditing Control access to network services Comprehensive review PREREQUISITES FOR THIS COURSE: Red Hat Certified Engineer (RHCE) certification, Red Hat Certified Systems Administrator (RHCSA) certification, or equivalent experience required COURSE DURATION - 4 Days (8hr/day) EXAM DURATION - 4 Hours

9 RED HAT CERTIFIED VIRTUALIZATION ADMINISTRATOR [RHCVA] A Red Hat Certified Virtualization Administrator (RHCVA) possesses the skills, knowledge, and abilities required to deploy and manage virtualization infrastructure, hosts, and guests using Red Hat Enterprise Virtualization. Students acquire the skills and knowledge to effectively create, deploy, manage, and migrate Linux and Microsoft Windows virtual machines hosted on either dedicated Red Hat Enterprise Virtualization Hypervisor nodes or Red Hat Enterprise Linux servers using Red Hat Enterprise Virtualization Manager. With hands-on labs and a deep dive into the technology, this training course is the perfect first step for enterprise planning or executing a virtualization deployment strategy. AN RHCVA IS CAPABLE OF THE FOLLOWING TASKS: Installing Red Hat Enterprise Virtualization Manager Creating datacenters, clusters, pools, and templates in Red Hat Enterprise Virtualization Manager Installing and configuring Red Hat Enterprise Virtualization hypervisors to support Linux and Windows users and manage them using Red Hat Enterprise Virtualization Manager Performing essential management tasks such as logging and bookmarking COURSE OVERVIEW: Overview of Red Hat Enterprise Virtualization Install, configure, and test Red Hat Enterprise Virtualization Manager. Install, configure, upgrade, and troubleshoot Red Hat Enterprise Virtualization Hypervisor. Create datacenters and clusters using Red Hat Enterprise Virtualization Manager. Create and administer data, iso, and export storage domains using Red Hat Enterprise Virtualization. Create logical networks using Red Hat Enterprise Virtualization Manager. Install, deploy, and manage virtual machines (VMs) with appropriate drivers and agents using Red Hat Enterprise Virtualization. Manage VMs with snapshots and share images using Red Hat Virtualization. Utilize templates, pools, and cloud-init to automate deployment of VMs using Red Hat Enterprise Virtualization. Locate information using the Red Hat Enterprise Virtualization administration portal to generate reports of the environment. Describe backing up and restoring Red Hat Enterprise Virtualization, making Red Hat Enterprise Virtualization highly available, and using the application programming interface (API). Install and configure a Red Hat Enterprise Linux host. Migrate VMs manually and automatically, and configure high availability with live migration using Red Hat Enterprise Virtualization. Comprehensive review PREREQUISITES FOR THIS COURSE: IT professionals who have earned an Red Hat Certified System Administrator (RHCSA) certification or maintain the equivalent experience with Linux System administration experience on Microsoft Windows operating systems is beneficial but not necessary for this course COURSE DURATION - 4 Days (8hr/day) EXAM DURATION - 3 Hours

10 MANAGING CONTAINERS WITH RED HAT ENTERPRISE LINUX ATOMIC HOST (RH270) Managing Containers with Red Hat Enterprise Linux Atomic Host (RH270) is designed for experienced Linux administrators, architects, and developers who want to manage containerized applications using the Docker command and Kubernetes. COURSE OVERVIEW Deploy and manage applications in a Docker containerized environment. Students will install and update Red Hat Enterprise Linux Atomic Host on a server, and deploy and manage applications in a Docker containerized environment. OUTLINE FOR THIS COURSE Install Red Hat Enterprise Linux Atomic Host software on a server. Subscribe to Red Hat Network and update Red Hat Enterprise Linux Atomic Host software. Download, deploy, customize, and save a container image. Build container images using Dockerfile and publish them using a private image registry. Deploy a multitiered application using containers and Kubernetes. Deploy flannel to allow for a multitiered application to be replicated on multiple hosts. Troubleshoot Red Hat Enterprise Linux Atomic Use support tools available to Red Hat Enterprise Linux Atomic Host to diagnose problem. AUDIENCE AND PREREQUISITES This course is intended for veteran Linux administrators, architects, and developers wishing to learn how to deploy and manage applications in a Docker containerized environment using Red Hat Enterprise Linux Atomic Host. COURSE DURATION - 3 Days (8hrs/day) or 12 Days (2hrs/day)

11 CERTIFIED ETHICAL HACKER [CEH] To beat a hacker, you need to think like one! This is exactly what this class will teach you. It is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one. ETHICAL HACKING The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/ or computer systems using the same methods and techniques as a Hacker. CEH TRAINING The Certified Ethical Hacker class will immerse the students into a hands-on environment where they will be shown how to conduct ethical hacking. They will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! They will scan, test, hack and secure their own systems. COURSE OUTLINE Introduction to Ethical Hacking Footprinting and Reconnaissance Scanning Networks Enumeration System Hacking Trojans and Backdoors Viruses and Worms Sniffers Social Engineering Denial of Service Session Hijacking Hacking Webservers Hacking Web Applications SQL Injection Hacking Wireless Networks Hacking Mobile Platforms Evading IDS, Firewalls, and Honeypots Buffer Overflow Cryptography Penetration Testing COURSE DURATION - 40 Hours OR Online at your convenience, from the comfort of your home EXAM DURATION - 4 Hours

12 COMPUTER HACKING FORENSICS INVESTIGATOR [CHFI] CHFI v8 Program certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The C HFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure. Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Computer forensic investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information. COURSE OUTLINE Computer Forensics in Today's World Computer Forensics Investigation Process Searching and Seizing Computers Digital Evidence First Responder Procedures Computer Forensics Lab Understanding Hard Disks and File Systems Windows Forensics Data Acquisition and Duplication Recovering Deleted Files and Deleted Partitions Forensics Investigation using Access Data FTK Forensics Investigation Using EnCase Steganography and Image File Forensics Application Password Crackers Log Capturing and Event Correlation Network Forensics, Investigating Logs and Investigating Network Traffic Investigating Wireless Attacks Investigating Web Attacks Tracking s and investigating Crimes Mobile Forensics Investigative Reports Becoming an Expert Witness COURSE DURATION - Online at your convenience, from the comfort of your home EXAM DURATION - 4 Hours

13 EC COUNCIL CERTIFIED SECURITY ANALYST [ECSA] The EC Council Certified Security Analyst (ECSA) program is a comprehensive, standards-based, methodology intensive training program which teaches information security professionals to conduct real life penetration tests by utilizing EC-Council s published penetration testing methodology. This Penetration Testing training course uses real-time scenarios to train students in penetration testing methodologies. EC-Council s Certified Security Analyst (ECSA) course will help you master a documented penetration testing methodology that is repeatable and that can be used in a penetration testing engagement, globally. Benefits of Becoming ECSA ECSA is for experienced professionals and is backed by a Curriculum designed by the best in the field. Students earn greater industry acceptance as seasoned security professionals. Certified Security Analysts learn to analyze the outcomes of security tools and security testing techniques. The ECSA sets students on the path toward achieving the LPT certification. COURSE OUTLINE Need for Security Analysis TCP IP Packet Analysis Penetration Testing Methodologies Customers and Legal Agreements Rules of Engagement Penetration Testing Planning and Scheduling Pre-penetration Testing Steps Information Gathering Vulnerability Analysis External Penetration Testing Internal Network Penetration Testing Firewall Penetration Testing IDS Penetration Testing Password Cracking Penetration Testing Social Engineering Penetration Testing Web Application Penetration Testing SQL Penetration Testing Penetration Testing Reports and Post Testing Actions COURSE DURATION - Online at your convenience, from the comfort of your home EXAM DURATION - 4 Hours

14 EC-COUNCIL NETWORK SECURITY ADMINISTRATOR [ENSA] COURSE DESCRIPTION The EC-Council's ENSA certification looks at the network security in defensive view while the CEH certification program looks at the security in offensive mode. The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization's information. Students will learn how to evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities and defend against them. WHO SHOULD ATTEND System administrators, Network administrators and anyone who is interested in network security technologies. COURSE OUTLINE Fundamentals of Computer Network Network Protocols Protocol Analysis Hardening Physical Security Network Security Security Standards Organizations Security Standards Security Policy IEEE Standards Network Security Threats Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS) Firewalls Packet Filtering and Proxy Servers Bastion Host and Honeypots Securing Modems Troubleshooting Network Hardening Routers Hardening Operating Systems Patch Management Log Analysis Application Security Web Security Security Authentication: Encryption, Cryptography and Digital Signatures Virtual Private Networks and Remote Networking Wireless Network Security Creating Fault Tolerance Incident Response Disaster Recovery and Planning Network Vulnerability Assessment COURSE DURATION - 4 Weeks (2hr/day) or 5 Days (8hr/day) EXAM DURATION - 4 Hours

15 EC-COUNCIL CERTIFIED SECURE PROGRAMMER [ECSP-JAVA] Today, Java is embedded in more than 3 billion devices such as laptops, data centers, game consoles, super computers, mobile phones, smart cards, and many more. Java is widely adopted because of its platform and architecture independent characteristics that encourages developers and industry alike. ECSP-Java is comprehensive course that provides hands-on training covering Java security features, policies, strengths, and weaknesses. It helps developers understand how to write secure and robust Java applications and provides advanced knowledge in various aspects of secure Java development that can effectively prevent hostile and buggy code. The end result of security Java coding practices include saving valuable effort, money, time, and possibly the reputation of organizations using Javacoded applications. WHAT WILL YOU LEARN? Java security principles and secure coding practices Java Security Platform, Sandbox, JVM, Class loading, Bytecode verifier, Security Manager, security policies, and Java Security Framework Secure Software Development Lifecycle, threat modelling, software security frameworks, and secure software architectures Best practices and standards and guidelines for secure file input/output and serialization Java input validation techniques, validation errors, and best practices Java exceptions, erroneous behaviors, and the best practices to handle or avoid them Secure authentication and authorization processes Java Authentication and Authorization Service (JAAS), its architecture, Pluggable Authentication Module (PAM) Framework, and access permissions through Java Security Model Secure Java concurrency and session management that includes Java Memory Model, Java Thread Implementation methods, secure coding practices, and guidelines for handling threads, race conditions, and deadlocks Core security coding practices of Java Cryptography that includes Encryption, KeyGenerator, implementation of Cipher Class, Digital Signatures, Secret Keys, and key management Various Java application vulnerabilities such as Cross-Site Scripting (XSS), Cross Site Request Forgery (CSRF), Directory Traversal vulnerability, HTTP Response Splitting attack, Parameter Manipulation, Injection Attacks and their countermeasures Coding testing and review techniques and practices PREREQUISITES You must be well-versed with Java programming language. WHO SHOULD ATTEND The ECSP certification is intended for programmers who are responsible for designing and building secure Windows/ Web based applications with Java. It is designed for developers who have Java development skills. COURSE DURATION - 3 Days (8 Hours per day) or 12 Days (2 Hours per day) OR Online at your convenience, from the comfort of your home EXAM DURATION - 2 Hours

16 FEW OF OUR ACHIEVEMENTS Participated in Apple World Wide Developer Conference (WWDC) 2013 in San Francisco Participated in LinuxCon and CloupOpen NA 2014 in Chicago Co-Creator of a internationally acclaimed product DigiValet ( Creator of a leading Firewall, Content Filtering & Security Appliance MASK365-UTM ( Our Master Trainer Swapnil Jain is a Member of Linux Foundation Swapnil Jain is one of few in the world to complete RHCA in less then 4 months to clear all exams in first attempt and with record score (5 of them with 100% score). COME CONNECT WITH US AT COMPANY WEBSITE: FACEBOOK PAGE: FACEBOOK GROUP: TWITTER: LINKEDIN: TECH BLOG: Bhagwandeen Nagar, Behind INOX Sapna Sangeeta Indore Ph: [email protected]

Develop a process for applying updates to systems, including verifying properties of the update. Create File Systems

Develop a process for applying updates to systems, including verifying properties of the update. Create File Systems RH413 Manage Software Updates Develop a process for applying updates to systems, including verifying properties of the update. Create File Systems Allocate an advanced file system layout, and use file

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux.

Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux. Red Hat Enterprise Linux 7- RH124 Red Hat System Administration I Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux. This course will actively engage students

More information

EC-Council Ethical Hacking and Countermeasures

EC-Council Ethical Hacking and Countermeasures EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

EC-Council. Certified Ethical Hacker. Program Brochure

EC-Council. Certified Ethical Hacker. Program Brochure EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional

More information

Hackers are here. Where are you?

Hackers are here. Where are you? 1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.

More information

LINUX / INFORMATION SECURITY

LINUX / INFORMATION SECURITY LINUX / INFORMATION SECURITY CERTIFICATE IN LINUX SYSTEM ADMINISTRATION The Linux open source operating system offers a wide range of graphical and command line tools that can be used to implement a high-performance,

More information

EC Council Certified Ethical Hacker V8

EC Council Certified Ethical Hacker V8 Course Code: ECCEH8 Vendor: Cyber Course Overview Duration: 5 RRP: 2,445 EC Council Certified Ethical Hacker V8 Overview This class will immerse the delegates into an interactive environment where they

More information

Small Systems Solutions is the. Premier Red Hat and Professional. VMware Certified Partner and Reseller. in Saudi Arabia, as well a competent

Small Systems Solutions is the. Premier Red Hat and Professional. VMware Certified Partner and Reseller. in Saudi Arabia, as well a competent T R A I N I N G C O U R S E S T H E # 1 L I N U X A N D O P E N S O U R C E P R O V I D E R I N S A U D I A R A B I A Introd uction to Linux Administra tion Adva nce Linux Ad ministrati on Linux Identity

More information

Principles of Information Assurance Syllabus

Principles of Information Assurance Syllabus Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

EC-Council Certified Security Analyst (ECSA)

EC-Council Certified Security Analyst (ECSA) EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for

More information

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity

More information

Networking: EC Council Network Security Administrator NSA

Networking: EC Council Network Security Administrator NSA coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

[CEH]: Ethical Hacking and Countermeasures

[CEH]: Ethical Hacking and Countermeasures [CEH]: Ethical Hacking and Countermeasures Length Audience(s) Delivery Method : 5 days : This course will significantly benefit security officers, auditors, security professionals, site administrators,

More information

RHCSA 7RHCE Red Haf Linux Certification Practice

RHCSA 7RHCE Red Haf Linux Certification Practice RHCSA 7RHCE Red Haf Linux Certification Practice Exams with Virtual Machines (Exams EX200 & EX300) "IcGraw-Hill is an independent entity from Red Hat, Inc., and is not affiliated with Red Hat, Inc. in

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation

More information

Brandman University. School of CCNA

Brandman University. School of CCNA Information Technology Certifications CCNA The Cisco CCNA Training Package (ICND: Parts 1 and 2) includes expert instructor-led training modules with customized presentations, practice exam simulators

More information

CYBERTRON NETWORK SOLUTIONS

CYBERTRON NETWORK SOLUTIONS CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified

More information

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed Venue Nairobi Kenya (exact hotel name to be confirmed before course) Dates March 31, 2014 April 4, 2014 Inovatec College Certified Ethical Hacker (CEH) boot camp The Certified Ethical Hacker (CEH) Certification

More information

Analyze. Secure. Defend. Do you hold ECSA credential?

Analyze. Secure. Defend. Do you hold ECSA credential? 1 Analyze. Secure. Defend. Do you hold ECSA credential? TM E C S A EC-Council Certified Security Analyst 1 EC-Council Cyber Security Professional Path Threat Agent Application of Methodology So You Can

More information

CEH Version8 Course Outline

CEH Version8 Course Outline CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information

More information

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

CH ENSA EC-Council Network Security Administrator Detailed Course Outline CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical

More information

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.

More information

GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III

GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III QWERTYUIOP{ GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III This GL254 course is designed to follow an identical set of topics as the Red Hat RH254, RH255 RHCE exam prep courses with the added

More information

Course Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E)

Course Venue :- Lab 302, IT Dept., Govt. Polytechnic Mumbai, Bandra (E) Information Technology Department CEP on CLOUD COMPUTING (Starting from 3 rd Jan 2015) Module No Course No Course Title Duration Fees Module 1 Course 1 RHCSA (Red Hat certified System 3 Weeks Rs. 6000

More information

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker EC-Council Hacking Technology C Certified E Ethical Hacker Certified Ethical Hacker v8 Certified Ethical Hacker Course Description CEHv8 is a comprehensive Ethical Hacking and Information Systems Security

More information

Web App Security Audit Services

Web App Security Audit Services locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System

More information

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 616 Securing Windows Infrastructure. Make The Difference CAST.

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 616 Securing Windows Infrastructure. Make The Difference CAST. CENTER FOR ADVANCED SECURITY TRAINING 616 Securing Windows Infrastructure Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape now requires

More information

Computer Hacking Forensic Investigator v8

Computer Hacking Forensic Investigator v8 CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer

More information

information security and its Describe what drives the need for information security.

information security and its Describe what drives the need for information security. Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.

More information

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker ALL ElNis ONE CEH Certified Ethical Hacker EXAM GUIDE Matt Walker Mc Grain/ New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto McGraw-Hill

More information

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב ע"ש ספיר

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב עש ספיר מודולות הלימוד של מייקרוסופט הקורס מחולק ל 4 מודולות כמפורט:.1Configuring Microsoft Windows Vista Client 70-620 Installing and upgrading Windows Vista Identify hardware requirements. Perform a clean installation.

More information

How To Get A Computer Hacking Program

How To Get A Computer Hacking Program CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator

More information

INFORMATION SECURITY TRAINING CATALOG (2015)

INFORMATION SECURITY TRAINING CATALOG (2015) INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,

More information

MCSA Security + Certification Program

MCSA Security + Certification Program MCSA Security + Certification Program 12 credit hours 270 hours to complete certifications Tuition: $4500 Information technology positions are high-demand occupations that support virtually all industries.

More information

CompTIA Security+ (Exam SY0-410)

CompTIA Security+ (Exam SY0-410) CompTIA Security+ (Exam SY0-410) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the

More information

MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track

MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track MICROSOFT CERTIFIED SYSTEMS ENGINEER Windows 2003 Track In recent years Microsoft s MCSE programs has established itself as the premier computer and networking industry certification. For the Windows 2003

More information

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led Course Description This class will immerse the student into an interactive environment where they will

More information

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

ITEC441- IS Security. Chapter 15 Performing a Penetration Test 1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and

More information

AV-006: Installing, Administering and Configuring Windows Server 2012

AV-006: Installing, Administering and Configuring Windows Server 2012 AV-006: Installing, Administering and Configuring Windows Server 2012 Career Details Duration 105 hours Prerequisites This course requires that student meet the following prerequisites, including that

More information

Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft)

Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft) Overview This 5-day course is intended for those wishing to qualify with. A+ is a foundation-level certification designed for IT professionals with around 1 year's experience whose job role is focused

More information

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

Course 20533: Implementing Microsoft Azure Infrastructure Solutions Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.

More information

CRYPTUS DIPLOMA IN IT SECURITY

CRYPTUS DIPLOMA IN IT SECURITY CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information

More information

Learn Ethical Hacking, Become a Pentester

Learn Ethical Hacking, Become a Pentester Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently

More information

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7 1 of 7 Network Support This technical certificate program prepares the student for employment as PC Technician; Computer Support Specialist, and Network Support Technician systems and computer network

More information

Red Hat Certifications: Red Hat Certified System Administrator (RHCSA)

Red Hat Certifications: Red Hat Certified System Administrator (RHCSA) Red Hat Certifications: Red Hat Certified System Administrator (RHCSA) Overview Red Hat is pleased to announce a new addition to its line of performance-based certifications Red Hat Certified System Administrator

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Network Security and Firewall 1

Network Security and Firewall 1 Department/program: Networking Course Code: CPT 224 Contact Hours: 96 Subject/Course WEB Access & Network Security: Theoretical: 2 Hours/week Year Two Semester: Two Prerequisite: NET304 Practical: 4 Hours/week

More information

MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)

MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required) MCSE 2003 Microsoft Certified Systems Engineer (MCSE) candidates on the Microsoft Windows Server 2003 track are required to satisfy the following requirements: Core Exams (6 Exams Required) Four networking

More information

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

Adobe Systems Incorporated

Adobe Systems Incorporated Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...

More information

RMAR Technologies Pvt. Ltd.

RMAR Technologies Pvt. Ltd. Course Name : StartXHack V2.0 Ethical Hacking & Cyber Security Course Duration : 2 Days (8Hrs./day) Course Fee : INR 1000/participant Course Module : 1. Introduction to Ethical Hacking a. What is Ethical

More information

Information Security. Training

Information Security. Training Information Security Training Importance of Information Security Training There is only one way to keep your product plans safe and that is by having a trained, aware and a conscientious workforce. - Kevin

More information

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.

More information

"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary

Charting the Course... ... to Your Success! MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test

More information

VMware vsphere: Install, Configure, Manage [V5.0]

VMware vsphere: Install, Configure, Manage [V5.0] VMware vsphere: Install, Configure, Manage [V5.0] Gain hands-on experience using VMware ESXi 5.0 and vcenter Server 5.0. In this hands-on, VMware -authorized course based on ESXi 5.0 and vcenter Server

More information

CXS-203-1 Citrix XenServer 6.0 Administration

CXS-203-1 Citrix XenServer 6.0 Administration Page1 CXS-203-1 Citrix XenServer 6.0 Administration In the Citrix XenServer 6.0 classroom training course, students are provided with the foundation necessary to effectively install, configure, administer,

More information

EC-Council. Program Brochure. EC-Council. Page 1

EC-Council. Program Brochure. EC-Council. Page 1 Program Brochure Page 1 Certified Ethical Hacker Version 7 Revolutionary Product releases the most advanced ethical hacking program in the world. This much anticipated version was designed by hackers and

More information

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth

More information

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html

More information

VMware vsphere 5.1 Advanced Administration

VMware vsphere 5.1 Advanced Administration Course ID VMW200 VMware vsphere 5.1 Advanced Administration Course Description This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter.

More information

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST. CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape

More information

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH) Course Number: CEH Length: 5 Day(s) Certification Exam This course will help you prepare for the following exams: Exam 312 50: Certified Ethical Hacker Course Overview The

More information

WEB APPLICATION FIREWALL

WEB APPLICATION FIREWALL WEB APPLICATION FIREWALL Sdn. Bhd. (1015448-T) A-5-10 Empire Tower SS16/1, Subang Jaya 47500, Selangor, Malaysia. Tel : +603 5021 8290 Fax : +603 5021 8291 Email : [email protected] Web: http://www.kaapagamtech.com

More information

VMware vsphere 5.0 Boot Camp

VMware vsphere 5.0 Boot Camp VMware vsphere 5.0 Boot Camp This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter. Assuming no prior virtualization experience, this

More information

neonex.in Head Office: Mastiska Technology Private Limited, E407, Ivory Towers, Sector 70, SAS Nagar, Mohali 160071

neonex.in Head Office: Mastiska Technology Private Limited, E407, Ivory Towers, Sector 70, SAS Nagar, Mohali 160071 neonex.in Head Office: Mastiska Technology Private Limited, E407, Ivory Towers, Sector 70, SAS Nagar, Mohali 160071 2014-2015 All rights reserved. Neonex, SCODEL and T2OC are the registered trademarks

More information

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the

More information

IT6203 Systems & Network Administration. (Optional)

IT6203 Systems & Network Administration. (Optional) Systems & Network Administration (Optional) INTRODUCTION This is one of the Optional courses designed for Semester 6 of the Bachelor of Information Technology Degree program. This course on Systems & Network

More information

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College 167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,

More information

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please

More information

Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led

Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led

More information

Network Defense Specialist. Course Title: Network Defense Specialist: Securing and Troubleshooting Network Operating Systems

Network Defense Specialist. Course Title: Network Defense Specialist: Securing and Troubleshooting Network Operating Systems Course Title: Network Defense Specialist: Securing and Troubleshooting Network Operating Systems Page 1 of 12 Course Description The Network Defense Series from EC-Council Press is comprised of 5 books

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Keyword: Cloud computing, service model, deployment model, network layer security.

Keyword: Cloud computing, service model, deployment model, network layer security. Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging

More information

Windows 7, Enterprise Desktop Support Technician

Windows 7, Enterprise Desktop Support Technician Course 50331D: Windows 7, Enterprise Desktop Support Technician Page 1 of 11 Windows 7, Enterprise Desktop Support Technician Course 50331D: 4 days; Instructor-Led Introduction This four-day instructor-ledcourse

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

Security + Certification (ITSY 1076) Syllabus

Security + Certification (ITSY 1076) Syllabus Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and

More information

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription

More information

Detailed Description about course module wise:

Detailed Description about course module wise: Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference

More information

FORBIDDEN - Ethical Hacking Workshop Duration

FORBIDDEN - Ethical Hacking Workshop Duration Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once

More information

Minnesota State Community and Technical College Detroit Lakes Campus

Minnesota State Community and Technical College Detroit Lakes Campus Computer Network Security Minnesota State Community and Technical College Detroit Lakes Campus Overview Philosophy Note on 2 year Colleges Certifications Program Courses CCDC Program Numbers Faculty Future

More information

Penetration Testing Service. By Comsec Information Security Consulting

Penetration Testing Service. By Comsec Information Security Consulting Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge

More information

College Training Program

College Training Program College Training Program Importance of Information Security Training There is only one way to keep your product plans safe and that is by having a trained, aware and a conscientious workforce. - Kevin

More information

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition Advanced Administration for Citrix NetScaler 9.0 Platinum Edition Course Length: 5 Days Course Code: CNS-300 Course Description This course provides the foundation to manage, configure and monitor advanced

More information

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

More information

Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting

Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting Course ID RHL200 Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting Course Description Students will experience added understanding of configuration issues of disks,

More information

CompTIA Network+ (Exam N10-005)

CompTIA Network+ (Exam N10-005) CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization

Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization Duration: Three consecutive Saturdays About this Course This instructor led course teaches students how to implement and manage Windows

More information

MCSA: Windows Server 2012 Boot Camp

MCSA: Windows Server 2012 Boot Camp www.etidaho.com (208) 327-0768 MCSA: Windows Server 2012 Boot Camp 9 Days Validate that you have the skills and knowledge necessary to administer a Windows Server 2012 in an enterprise environment. Gain

More information