College Training Program
Importance of Information Security Training There is only one way to keep your product plans safe and that is by having a trained, aware and a conscientious workforce. - Kevin Mitnick, The Art of Deception A major challenge within Information Security is the pace at which technology changes, causing threats and attacks to emerge out of no-where. Security risks continue to affect all types and scales of businesses. People or Companies who loose sensitive information can result in risk of large losses, legal liabilities, bad reputation and future loss of earnings. Provided number of serious information security attacks and breaches, security training is the first line of defence required for all roles from Employees to Executives based on type of work they are indulged in.
Why HackSecure for Information Security Training HackSecure excels in providing intensive, immersion training designed to master the practical steps necessary for defending systems against the dangerous security threats like identity theft, phishing scams, virus and backdoors, loss of confidential information, hacking attacks etc. We strive to scale up to highest benchmark standards established in the industry. Our wide range of courses cover various aspects of Information Security with hands-on training that allow an individual to easily get ready for the practice. HackSecure provides customized IT Security Training per specific requirements through a most suitable mode of delivery. One can choose to attend courses Online (On-demand or Live) or with our Instructor-Led-Training programs scheduled either at your premise or externally at pre-defined venue.
HackSecure College Training Program Our College training programs are designed especially to help students in getting better visibility in IT industry as an eligible and prospective candidate with domain specific skills. It helps colleges with better branding and positioning in area of IT and Education. The On-Campus Program is strongly focused on transforming any student into a responsible professional. This program is not only limited to technology but also involves Soft skills and other professional tips from our experienced faculty that will keep one stand out of crowd. Our Training and Workshops helps recruiters, be it on-campus or off-campus, to choose a right candidate with domain specific skills and real-time experience in core areas of IT. We minimize efforts required for any employer to up-scale any employee for boarding them live on project work.
Topics offered under College Program Topics Program Topics Duration (Hours) Information Security Concepts & Principles 1 Information Security Virtualization and Cloud Data Center 3 Storage Network Security Concepts OWASP Top10 Web Security Risk Cloud Security Operating System Security Virtualization Overview Cloud Computing (SaaS, PaaS & IaaS) Datacenter Evolution and Architecture Datacenter over Cloud Storage Classification, Concepts and Protocol overview 4 Networking OSI Model, Protocols & Devices 3 5 Softskills Resume Writing, Interview Handling Skills, Presentation Skills 1 1 1
Information Security Information Security Concepts & Principles Pre-Requisites: Basic understanding of Computer Systems and Internet Duration: hrs. o Overview on Security Concepts like Confidentiality, Integrity, Availability, Authentication, Authorization, Accountability etc. o Cryptographic basics including Symmetric & Asymmetric cryptography, SSL/TLS protocol overview, Digital Signature. o Overview on Security Design principles. Network Security Concepts Pre-Requisites: Information Security and Networking basic Concepts Duration: hrs. o Basic understanding of network Security best practices like Defence-in-Depth, Segmentation, NAT etc. o Overview on Security devices and their functionality like Firewall, IDS/IPS, and Honeypots etc. o Common Network Attacks and defence against them.
OWASP Top10 Web Security Risk Pre-Requisites: Basic Information Security Concepts Duration: hrs. o Overview on OWASP Top10 Attacks and possible countermeasures o SQL Injection o Broken Authentication & Session Management o Cross-Site Scripting (XSS) o Insecure Direct Object References o Security Misconfigurations o Sensitive Data Exposure o Missing Functional level Access Control o Cross Site Request Forgery (XSRF) o Using components with known vulnerabilities o Un-validated Redirects and Forwards Cloud Security Pre-Requisites: Information Security & Cloud Computing basic concepts Duration: hrs. o Security Challenges in Cloud Adoption o Top threats in Cloud Security o Data breaches & Loss o Traffic Hijacking o Insecure APIs o Denial of Service Attacks o Service abuse o Insufficient due-diligence etc.
Operating System Security Pre-Requisites: Information Security & OS basic concepts Duration: hrs. o File System Security o OS level Access Control o Stack & Buffer Overflow o ASLR, NX bit protection o Race Condition o Patching in OS Virtualization and Cloud Data Centre Virtualization Overview Pre-Requisites: Basic Networking concepts Duration: 1 hr. o Virtualization overview and types o Benefits of Virtualization like o Workload Separation, o Resource Utilization etc. o Overview on VMware vsphere and Hypervisor
Cloud Computing Concepts Pre-Requisites: Basic Networking & Virtualization concepts Duration: hrs. o Introduction to Cloud Computing and its Architecture o Understanding of different Cloud Services and Application types like SaaS, PaaS, IaaS etc o Overview on some of Cloud Applications o Future of Cloud Computing DataCenter Evolution and Architecture Pre-Requisites: Basic Storage concepts Duration: 1 hr. o DataCenter evolution from Microprocessor to cloud o Datacenter design models o Multi-tier model o Server cluster model DataCenter over Cloud Pre-Requisites: Basic Storage, Virtualization and Cloud computing concepts Duration: 1 hr. o Overview on Cloud Storage o Solutions to enable Cloud DataCenter
Storage Storage Classification, Concepts and Protocols overview Pre-Requisites: Basic Networking concepts Duration: hrs. o Importance of Storage in IT o Overview on RAID (Redundant Array of Inexpensive disks) o Overview on Data Storage Technologies o Direct Attached Storage (DAS) o Network Attached Storage (NAS) o Storage Area networks (SAN) o SAN over IP o Fibre Channel(FC) over Ethernet (FCoE) o SCSI over IP (iscsi) o Some more Storage Protocols o Common Internet File System (CIFS) o Network File System (NFS)
Networking OSI Model, Protocols & Devices Pre-Requisites: Basic understanding of Computer Systems and Internet Duration: 3 hrs. Soft Skills o Overview on OSI Reference Model and its layers o Network Architecture and Design o Network Interface, Addressing etc. o Switches, Bridges, Routers and Gateways o TCP/IP Networking o TCP, UDP o IP, ICMP o DNS o Application Protocols o SSL/TLS o HTTP o POP, SMTP Resume Writing, Interview Handling Skills, Presentation Skills Duration: hrs. o Creating Effective Resume: DO's & Don'ts o Importance of Keywords in Resume o Handling Telephonic & Face-to-Face Interview sessions o Presenting yourself in Interview
Information Security Awareness Information Security Training Corporate Training Application Security Testing Web Penetration Testing Network Penetration testing Vulnerability Assessment Threat Modeling Security Consultation Contact Us For Information Security Training Programs training@hacksecure.com For Professional Security Services services@hacksecure.com For General Enquiry info@hacksecure.com +91 900 81 78676 +91 900 83 78676 www.hacksecure.com HackSecure.India hacksecure