e-code Academy Information Security Diploma Training Discerption



Similar documents
Secure Data Exchange Solution

Secure USB Flash Drive. Biometric & Professional Drives

Weighted Total Mark. Weighted Exam Mark

Introduction to Cyber Security / Information Security

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Major prerequisites by topic: Basic concepts in operating systems, computer networks, and database systems. Intermediate programming.

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

City University of Hong Kong. Information on a Course offered by Department of Electronic Engineering with effect from Semester A in 2012/2013

Secure Web Access Solution

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

University of Wisconsin-Whitewater Curriculum Proposal Form #3 New Course

Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Curran, K. Tutorials. Independent study (including assessment) N/A

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

MS-55096: Securing Data on Microsoft SQL Server 2012

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

(IŞIK - IT201) 1 / 6 COURSE PROFILE. Theory+PS+Lab (hour/week) Local Credits. Course Name Code Semester Term ECTS

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science & Engineering. Sixth Semester

Computer and Network Security PG Unit Outline School of Information Sciences and Engineering

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Security + Certification (ITSY 1076) Syllabus

Securing Data on Microsoft SQL Server 2012

LINUX / INFORMATION SECURITY

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Information Security Course Specifications

EC Council Certified Ethical Hacker V8

CRYPTOGRAPHY AND NETWORK SECURITY

ITSY Security Assessment/Auditing Spring 2010 Professor: Zoltan Szabo D111 LEC TR 11:20AM 12:45PM D111 LAB TR 12:50PM 02:15PM

CRYPTOG NETWORK SECURITY

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Open Source Security Tools for Information Technology Professionals

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Bachelor of Information Technology (Network Security)

RYERSON UNIVERSITY Ted Rogers School of Information Technology Management And G. Raymond Chang School of Continuing Education

EC-Council. Certified Ethical Hacker. Program Brochure

CS 450/650 Fundamentals of Integrated Computer Security

Build Your Own Security Lab

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

CRYPTUS DIPLOMA IN IT SECURITY

Bellevue University Cybersecurity Programs & Courses

MS Information Security (MSIS)

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

CSCI 454/554 Computer and Network Security. Instructor: Dr. Kun Sun

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

CEH Version8 Course Outline

Ethical Hacking Course Layout

Advanced Authentication

Critical Controls for Cyber Security.

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

CS Ethical Hacking Spring 2016

Information, Network & Cyber Security

F21CN: Computer Network Security: Overview

Single Sign-On Secure Authentication Password Mechanism

Certified Cyber Security Analyst VS-1160

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Professional Penetration Testing Techniques and Vulnerability Assessment ...

[CEH]: Ethical Hacking and Countermeasures

CS 464/564 Networked Systems Security SYLLABUS

SCP - Strategic Infrastructure Security

Network Security Course Specifications

Network Security Essentials:

The Encryption Technology of Automatic Teller Machine Networks

Certified Ethical Hacker (CEH)

IT Networking and Security

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Multifactor authentication systems Jiří Sobotka, Radek Doležel

Dept. of Financial Information Security

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

Fundamentals of Network Security - Theory and Practice-

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

IT and Cyber Security Training Courses

Master of Science in Information Systems & Security Management. Courses Descriptions

MySQL Security: Best Practices

CCNA Security v1.0 Scope and Sequence

City University of Hong Kong. Information on a Course offered by Department of Computer Science with effect from Semester A in 2014 / 2015

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

Embedded Java & Secure Element for high security in IoT systems

Table of Contents. Introduction. Audience. At Course Completion

90% of data breaches are caused by software vulnerabilities.

CSC 474 Information Systems Security

Department of Computer Science

Networking: EC Council Network Security Administrator NSA

Computer Security Curriculum at the Univ. of Wisconsin Eau Claire. Paul J. Wagner

Microsoft Technologies

Please consult the Department of Engineering about the Computer Engineering Emphasis.

Building the Next Generation of Computer Security Professionals. Chris Simpson

EECS 588: Computer and Network Security. Introduction January 14, 2014

CCNA Security v1.0 Scope and Sequence

CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security

Transcription:

e-code Academy Information Security Diploma Training 2015

I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. OBJECTIVE... 3 LIST OF POSTGRADUATE COURSES... 3 FIRST SEMESTER (2 MONTHS)... 4 SECOND SEMESTER (2 MONTHS)... 4 PROJECT (1 MONTH)... 4 LABORATORY REQUIREMENTS... 5 PREREQUISITES... 5 IV. COURSE SYLLABUSES... 5 ISC 901 SECURITY ENGINEERING... 5 ISC 910 CRYPTOGRAPHY... 6 ISC 912 SECURITY PROGRAMMING... 6 ISC 913 SECURITY STANDARDS... 6 ISC 920 NETWORK AND SYSTEMS SECURITY... 7 ISC 921 ETHICAL HACKING... 7 ISC 930 SOFTWARE SECURITY... 8 ISC 940 SECURE HARDWARE PROGRAMMING... 8 ISC 950 SECURITY PROJECT... 9 V. ABOUT E-CODE... 10 1

II. INTRODUCTION Overview In this diploma, candidates will study the Digital Security basics. The candidate will be aware of following topics: cryptography theory, the differences between cryptographic techniques, the strength and the weakness, the software and hardware implementation of cryptographic techniques, data encryption, data integrity, digital signature, data security attacks and cryptanalysis techniques, security standards, security software and smart card programming, security hardware and security hardware programming. The diploma takes a duration of five months, divided into two semester followed by project. In each semester there are practical lap with experiments related to studied topics. The curriculum provides detailed plan of courses schedule, lab requirements, prerequisites, and course details. By the end of each course there is an exam. In the last month there is a practical project ends with demonstration and evaluation. By the end of diploma successful candidates take a certification with the archived grade. Copyrights and Trademarks All of the content on this manual and accompanying software(including all text, graphics, sounds, demos, patches, hints and other files) is covered under KSA and international copyright and trademark laws by E-Code and other companies, and are property of E-Code, or are presented with permission and/or under license. This content may not be used for any commercial use without express written permission of E-Code, and possibly other copyright or trademark owners. All other trademarks and copyrights are the property of their respective owners. 2015, E-Code 2

III. OBJECTIVE Provide recent technology and techniques related to digital security Provide practical experience related to digital security Provide theoretical background related to digital security Provide the market with digital security experts Prepare student to advanced digital security studies like Master and PHD List of Postgraduate s First Semester ISC 901 Security Engineering ISC 910 Cryptography ISC 921 Ethical Hacking ISC 912 Security Programming Using Security Software Laboratory Second Semester ISC 930 Software Security ISC 913 Security Standards ISC 920 Network and Systems Security ISC 940 Secure Hardware Programming Using Security Hardware Laboratory Project ISC 950 Security Project 3

First Semester (2 Months) No Code Name Final Work Lab Total Hours 1 ISC 901 Security Engineering 70 30 0 100 48 2 ISC 910 Cryptography 70 30 0 100 48 3 ISC 921 Ethical Hacking 70 30 0 100 48 4 ISC 912 Security Programming 70 30 0 100 48 5 - - Using Security Hardware Laboratory Second Semester (2 Months) - - - - 24 Total in Two Months 216 No Code Name Final Work Lab Total Hours 1 ISC 930 Software Security 70 30 0 100 48 2 ISC 913 Security Standards 70 30 0 100 48 3 ISC 920 Network and Systems Security 70 30 0 100 48 4 ISC 940 Secure Hardware Programming 70 30 0 100 48 5 - - Using Security Hardware Laboratory Project (1 Month) - - - - 24 Total in Two Months 216 No Code Name Final Work Lab Total Hours 1 ISC 950 Security Project 200 0 100 300 108 4

Laboratory Requirements High Speed Computers (i5/8gb) Secure Microcontroller Boards or Emulators Prerequisites Math Probability and Statistics C Programming C++ Programming Microcontroller Programming IV. COURSE SYLLABUSES ISC 901 Security Engineering Security Engineering Code ISC 901 References Introduction to Security Engineering, Usability and Psychology, Protocols, Access Control, Cryptography, Distributed Systems, Economics, Multilevel Security, Multilateral Security, Banking and Bookkeeping, Physical Protection, Monitoring and Metering, Nuclear Command and Control, Security Printing and Seals, Biometrics, Physical Tamper Resistance, Emission Security, API Security, Electronic and Information Warfare, Telecom System Security, Network Attack and Defense, Copyright and DRM, The Bleeding Edge, Terror, Justice and Freedom, Managing the Development of Secure Systems, System Evaluation and Assurance. Ross J. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley, 2008 5

ISC 910 Cryptography Cryptography Code ISC 910 References Introduction to Cryptography Systems, Classical Ciphers, Block Ciphers and DES, Finite Fields, Advanced Encryption Standards, Block Cipher Operations, Pseudorandom Number Generation and Stream Ciphers, Number Theory, Public- Key Cryptography and RSA, Other Public-Key Cryptosystems, Cryptographic Hash Functions, Message Authentication Codes, Digital Signatures. William Stallings, Cryptography and Network Security, William Stallings, 5 th Edition, Prentice Hall, 2010 ISC 912 Security Programming Security Programming Code ISC 912 Using Microsoft Cryptography Service Provider SDK (CSP, CNG), Using RSA Public Key Cryptographic System SDK (PKCS11), And Using Java Security SDK. References Microsoft CSP SDK Reference Guide Microsoft CNG SDK Reference Guide RSA PKCS11 SDK Reference Guide Java Security Reference Guide Basics of Smart Card Programming using Java ISC 913 Security Standards Security Standards Code ISC 913 Common Criteria, Introduction, Common Criteria Standards, Process Overview, Pre-Evaluation Preparation, Developing the Business Case, Resource Allocation, Managing Project Scope, Partner Selection, Evidence Developments Tips, Security Target, Development Evidence, Lifecycle Support Evidence, Test, Vulnerabilities Assessment and Guidance Evidence, Case Studies. 6

FIPS, Introduction, Threats and Risks, FIPS 140 Overview, Algorithm Validation, Module Validation, Cost and Timeline, Security Requirements, Case Studies. References Wesley Hisao Higaki and Yukie Higaki, Successful Common Criteria Evaluations: A Practical Guide for Vendors, CreateSpace Independent Publishing Platform, 2010 Wesley Hisao Higaki, Ray Potter and Yukie Higaki, FIPS 140 Demystified: An Introductory Guide for Vendors, CreateSpace Independent Publishing Platform, 2010 Common Criteria Standards FIPS 140 Standards ISC 920 Network and Systems Security Network and Systems Security Code ISC 920 References Mutual Authentication, Key Management and Distribution, User Authentication Protocols, Network Security, Transport-Level Security, Wireless Network Security, Electronic Mail Security, IP Security, System Security, Intruders, Malicious Software, Firewalls, Legal and Ethical Issues. William Stallings, Cryptography and Network Security, 5 th Edition, Prentice Hall, 2010 ISC 921 Ethical Hacking Ethical Hacking Code ISC 921 Overview, TCP/IP Concepts Review, Network and Computers Attacks, Footprinting and Social Engineering, Port Scanning, Enumeration, Programming for Security Professionals, Desktop and Server OS Vulnerabilities, Embedded Operating Systems the Hidden Threat, Hacking Web Servers, Hacking Wireless Network, Cryptography and Cryptographic Attacks, Network Protection Systems. 7

References Michael T. Simpson, Kent Backman and James Corley, Hands-On Ethical Hacking and Network Defense, 2 nd Edition, Delmar Cengage Learning, 2010 ISC 930 Software Security Software Security Code ISC 930 Software Cracking, Assembly Language, Windows Reverse Engineering, Linux Reverse Engineering, Windows CE Reverse Engineering, Overflow Attack, Network Stalking, TCP/IP Analysis, Social Engineering, Reconnaissance, OS Fingerprinting, Hiding the Tracks, Platform Attacks, Unix Defense, Unix, Attacks, Windows Client Attacks, Windows Server Attacks, SOAP XML Web Services Security, SQL Injection, Wireless Security, Advanced Defense, Audit Trail Analysis, Intrusion Detection Systems, Honeypots, Incident Response, Forensics and Anti forensics. References Cyrus Peikari and Anton Chuvakin, Security Warrior, O'Reilly Media, 2004 ISC 940 Secure Hardware Programming Secure Hardware Programming Code ISC 940 Introduction to 8051, Introduction to Smart MX, Using UART, Using CIU, Using MMU, Using Checksum, Using Copy Machines, Using SBC Module for Symmetric Ciphers, Using Fame2 for Asymmetric Ciphers. References NXP P60 Datasheet Muhammad Ali Mazidi, Janice G. Mazidi and Rolin D. McKinlay, The 8051 Microcontroller and Embedded Systems, 2 nd Edition, Prentice Hall, 2005 8

ISC 950 Security Project Practical project in one of the following areas: Cryptography and Data Security, Networks and Systems security, Software Security, Hardware Security. 9

V. ABOUT E-CODE E-Code is a leading progressive, innovative company in the field of information security providing technology, state of the art solutions, consulting, integration and testing services to safeguard the information assets, identities and the supporting infrastructure against unauthorized use. Our high quality service and excellent benefits and the ability of being reliable and responsible put us as a leader on the top of digital security companies. E-Code provides unique products and solutions, which cover many security areas fulfilling customers need in different market sectors. We provide a set of products and solutions covering the following areas: software protection, data encryption, security hardware, digital signature, secure identification and authentication, secure online distribution of digital Contents. We supports different market sectors like; governmental institutes, organizations, banks, software development companies, multimedia software and game producers, media and ebooks publishers and individual users. Dongle Fingerprint Smart Token Smart Card Fingerprint Smart OTP Card Smart Token Fingerprint OTP Token Secure SD Card Secure Flash with Fingerprint Website Email www.e-code.com info@e-code.com, support@e-code.com, sales@e-code.com Telephone Fax 10