College Training Program



Similar documents
Information Security. Training

Cloud Security:Threats & Mitgations

From the Bottom to the Top: The Evolution of Application Monitoring

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Web App Security Audit Services

Penta Security 3rd Generation Web Application Firewall No Signature Required.

Where every interaction matters.

Keyword: Cloud computing, service model, deployment model, network layer security.

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

Advanced Higher Computing. Computer Networks. Homework Sheets

Table of Contents. Page 2/13

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

Mean Time to Fix (MTTF) IT Risk s Dirty Little Secret Joe Krull, CPP, CISSP, IAM, CISA, A.Inst.ISP, CRISC, CIPP

Network Security Administrator

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

Adobe Systems Incorporated

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Information Security Services

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

Magento Security and Vulnerabilities. Roman Stepanov

CRYPTUS DIPLOMA IN IT SECURITY

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Overview of the Penetration Test Implementation and Service. Peter Kanters

Sitefinity Security and Best Practices

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

CompTIA Security+ (Exam SY0-410)

The functionality and advantages of a high-availability file server system

Cloud Security Framework (CSF): Gap Analysis & Roadmap

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

Web Engineering Web Application Security Issues

Passing PCI Compliance How to Address the Application Security Mandates

How To Understand And Understand The Security Of A Web Browser (For Web Users)

DDoS Protection Technology White Paper

CNS-301-3I ~ Citrix NetScaler 11 Advanced Implementation

OWASP AND APPLICATION SECURITY

Security + Certification (ITSY 1076) Syllabus

Networking: EC Council Network Security Administrator NSA

90% of data breaches are caused by software vulnerabilities.

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Attacks from the Inside

Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive

Implementing Cisco IOS Network Security

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Development Processes (Lecture outline)

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Application Security Best Practices. Wally LEE Principal Consultant

Summary of the SEED Labs For Authors and Publishers

Cloud Security Framework (CSF): Gap Analysis & Roadmap

CEH Version8 Course Outline

Learn Ethical Hacking, Become a Pentester

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Chapter 11 Cloud Application Development

Swisscom Cloud. Building a secure cloud. SIGS, Christof Jungo

Web Application Attacks and Countermeasures: Case Studies from Financial Systems

PCI Compliance Updates

Ethical Hacking Penetrating Web 2.0 Security

International Journal of Innovative Technology & Adaptive Management (IJITAM) ISSN: , Volume-1, Issue-5, February 2014

SAST, DAST and Vulnerability Assessments, = 4

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY


What is Web Security? Motivation

Web Application Vulnerability Testing with Nessus

Detailed Description about course module wise:

The Electronic Arms Race of Cyber Security 4.2 Lecture 7

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

SERENA SOFTWARE Serena Service Manager Security

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Professional Penetration Testing Techniques and Vulnerability Assessment ...

TEAM Academy Catalog. 187 Ballardvale Street, Wilmington, MA

Pentests more than just using the proper tools

OWASP Top Ten Tools and Tactics

SQuAD: Application Security Testing

Web application testing

Web Application Penetration Testing

External Supplier Control Requirements

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Pentests more than just using the proper tools

Malicious Network Traffic Analysis

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

Transcription:

College Training Program

Importance of Information Security Training There is only one way to keep your product plans safe and that is by having a trained, aware and a conscientious workforce. - Kevin Mitnick, The Art of Deception A major challenge within Information Security is the pace at which technology changes, causing threats and attacks to emerge out of no-where. Security risks continue to affect all types and scales of businesses. People or Companies who loose sensitive information can result in risk of large losses, legal liabilities, bad reputation and future loss of earnings. Provided number of serious information security attacks and breaches, security training is the first line of defence required for all roles from Employees to Executives based on type of work they are indulged in.

Why HackSecure for Information Security Training HackSecure excels in providing intensive, immersion training designed to master the practical steps necessary for defending systems against the dangerous security threats like identity theft, phishing scams, virus and backdoors, loss of confidential information, hacking attacks etc. We strive to scale up to highest benchmark standards established in the industry. Our wide range of courses cover various aspects of Information Security with hands-on training that allow an individual to easily get ready for the practice. HackSecure provides customized IT Security Training per specific requirements through a most suitable mode of delivery. One can choose to attend courses Online (On-demand or Live) or with our Instructor-Led-Training programs scheduled either at your premise or externally at pre-defined venue.

HackSecure College Training Program Our College training programs are designed especially to help students in getting better visibility in IT industry as an eligible and prospective candidate with domain specific skills. It helps colleges with better branding and positioning in area of IT and Education. The On-Campus Program is strongly focused on transforming any student into a responsible professional. This program is not only limited to technology but also involves Soft skills and other professional tips from our experienced faculty that will keep one stand out of crowd. Our Training and Workshops helps recruiters, be it on-campus or off-campus, to choose a right candidate with domain specific skills and real-time experience in core areas of IT. We minimize efforts required for any employer to up-scale any employee for boarding them live on project work.

Topics offered under College Program Topics Program Topics Duration (Hours) Information Security Concepts & Principles 1 Information Security Virtualization and Cloud Data Center 3 Storage Network Security Concepts OWASP Top10 Web Security Risk Cloud Security Operating System Security Virtualization Overview Cloud Computing (SaaS, PaaS & IaaS) Datacenter Evolution and Architecture Datacenter over Cloud Storage Classification, Concepts and Protocol overview 4 Networking OSI Model, Protocols & Devices 3 5 Softskills Resume Writing, Interview Handling Skills, Presentation Skills 1 1 1

Information Security Information Security Concepts & Principles Pre-Requisites: Basic understanding of Computer Systems and Internet Duration: hrs. o Overview on Security Concepts like Confidentiality, Integrity, Availability, Authentication, Authorization, Accountability etc. o Cryptographic basics including Symmetric & Asymmetric cryptography, SSL/TLS protocol overview, Digital Signature. o Overview on Security Design principles. Network Security Concepts Pre-Requisites: Information Security and Networking basic Concepts Duration: hrs. o Basic understanding of network Security best practices like Defence-in-Depth, Segmentation, NAT etc. o Overview on Security devices and their functionality like Firewall, IDS/IPS, and Honeypots etc. o Common Network Attacks and defence against them.

OWASP Top10 Web Security Risk Pre-Requisites: Basic Information Security Concepts Duration: hrs. o Overview on OWASP Top10 Attacks and possible countermeasures o SQL Injection o Broken Authentication & Session Management o Cross-Site Scripting (XSS) o Insecure Direct Object References o Security Misconfigurations o Sensitive Data Exposure o Missing Functional level Access Control o Cross Site Request Forgery (XSRF) o Using components with known vulnerabilities o Un-validated Redirects and Forwards Cloud Security Pre-Requisites: Information Security & Cloud Computing basic concepts Duration: hrs. o Security Challenges in Cloud Adoption o Top threats in Cloud Security o Data breaches & Loss o Traffic Hijacking o Insecure APIs o Denial of Service Attacks o Service abuse o Insufficient due-diligence etc.

Operating System Security Pre-Requisites: Information Security & OS basic concepts Duration: hrs. o File System Security o OS level Access Control o Stack & Buffer Overflow o ASLR, NX bit protection o Race Condition o Patching in OS Virtualization and Cloud Data Centre Virtualization Overview Pre-Requisites: Basic Networking concepts Duration: 1 hr. o Virtualization overview and types o Benefits of Virtualization like o Workload Separation, o Resource Utilization etc. o Overview on VMware vsphere and Hypervisor

Cloud Computing Concepts Pre-Requisites: Basic Networking & Virtualization concepts Duration: hrs. o Introduction to Cloud Computing and its Architecture o Understanding of different Cloud Services and Application types like SaaS, PaaS, IaaS etc o Overview on some of Cloud Applications o Future of Cloud Computing DataCenter Evolution and Architecture Pre-Requisites: Basic Storage concepts Duration: 1 hr. o DataCenter evolution from Microprocessor to cloud o Datacenter design models o Multi-tier model o Server cluster model DataCenter over Cloud Pre-Requisites: Basic Storage, Virtualization and Cloud computing concepts Duration: 1 hr. o Overview on Cloud Storage o Solutions to enable Cloud DataCenter

Storage Storage Classification, Concepts and Protocols overview Pre-Requisites: Basic Networking concepts Duration: hrs. o Importance of Storage in IT o Overview on RAID (Redundant Array of Inexpensive disks) o Overview on Data Storage Technologies o Direct Attached Storage (DAS) o Network Attached Storage (NAS) o Storage Area networks (SAN) o SAN over IP o Fibre Channel(FC) over Ethernet (FCoE) o SCSI over IP (iscsi) o Some more Storage Protocols o Common Internet File System (CIFS) o Network File System (NFS)

Networking OSI Model, Protocols & Devices Pre-Requisites: Basic understanding of Computer Systems and Internet Duration: 3 hrs. Soft Skills o Overview on OSI Reference Model and its layers o Network Architecture and Design o Network Interface, Addressing etc. o Switches, Bridges, Routers and Gateways o TCP/IP Networking o TCP, UDP o IP, ICMP o DNS o Application Protocols o SSL/TLS o HTTP o POP, SMTP Resume Writing, Interview Handling Skills, Presentation Skills Duration: hrs. o Creating Effective Resume: DO's & Don'ts o Importance of Keywords in Resume o Handling Telephonic & Face-to-Face Interview sessions o Presenting yourself in Interview

Information Security Awareness Information Security Training Corporate Training Application Security Testing Web Penetration Testing Network Penetration testing Vulnerability Assessment Threat Modeling Security Consultation Contact Us For Information Security Training Programs training@hacksecure.com For Professional Security Services services@hacksecure.com For General Enquiry info@hacksecure.com +91 900 81 78676 +91 900 83 78676 www.hacksecure.com HackSecure.India hacksecure