space
Search Courses  in 

Get COURSE FEES & Discounts from BEST Security Auditing Institutes in Egmore!

 

My Name

My Mobile Number

My Email ID

 

Security Auditing Training Centers, Institutes & Training Course Classes in Egmore- Listings as of April 20, 2018.

As on April 20, 2018, We have total of 1 Security Auditing training institutes in and around also near to Egmore area in Chennai with best training centers, institute address, Phone numbers, course fee, working hours and student reviews listed.

 

 

training institutes ZYBEAK TECHNOLOGIES - Egmore
Chennai - Egmore
No Reviews. Write a Review
training institute
Address: 254/ A Ethiraj Salai, Egmore, Chennai google map of 12861

ZYBEAK TECHNOLOGIES - Egmore provides best Security Auditing Training, Security Auditing Training classes & Realtime Training Egmore.
 
First << 1  >> Last

 

 

 

Related Training Courses for Security Auditing in egmore

 

 

Security Auditing course Content / syllabus at egmore, chennai.

We gathered most widely used Security Auditing course content used by training institutes in egmore,chennai. The Security Auditing course syllabus covers basic to advanced level and it may vary based on Security Auditing training classes offered in egmore.

 

Unit 1: Security Concepts and Mechanisms

Module I: Networking Concepts Overview
Lesson 1: Basics of Communication Systems
Lesson 2: Transmission Media
Lesson 3: ISO/OSI and TCP/IP Protocol Stacks
Lesson 4: Local Area Networks
Lesson 5: Wide Area Networks
Lesson 6 : Internetworking
Lesson 7 : Packet Formats
Lesson 8 : Wireless Networks
Lesson 9 : The Internet

Module 2: Information Security Concepts
Lesson 1 : Information Security Overview
Lesson 2 : Information Security Services
Lesson 3 : Types of Attacks
Lesson 4 : Goals for Security
Lesson 5 : E-commerce Security
Lesson 6 : Computer Forensics
Lesson 7 : Steganography
Lesson 8 : Security Engineering

Module 3: Security Threats and vulnerabilities
Lesson 1 : Overview of Security threats
Lesson 2 : Hacking Techniques
Lesson 3 : Password Cracking
Lesson 4 : Insecure Network connections
Lesson 5 : Malicious Code
Lesson 6 : Programming Bugs
Lesson 7 : Cyber crime and Cyber terrorism
Lesson 8 : Information Warfare and Surveillance

Module 4: Cryptography
Lesson 1 : Introduction to Cryptography
Lesson 2 : Symmetric key Cryptography
Lesson 3 : Asymmetric key Cryptography
Lesson 4 : Message Authentication and Hash functions
Lesson 5 : Digital Signatures
Lesson 6 : Public Key infrastructure
Lesson 7 : Diffe-Hellman key exchange proptocol
Lesson 8 : Applications of Cryptography

Unit 2: Security Management
ModuleI: Security Management Practices
Lesson 1: Overview of Security Management
Lesson 2: Information Classification Process
Lesson 3: Security Policy
Lesson 4: Risk Management
Lesson 5: Security Procedures and Guidelines
Lesson 6: Business Continuity and Disa ster Recovery

Module2: Security Laws and Standards
Lesson 1: Security Assurance
Lesson 2: Security Laws
Lesson 3: International Standards
Lesson 4: Security Audit
Lesson 5: OCTAVE approach
Lesson 6: SSE-CMM Unit 3

Unit 3: Network Security
Module 1: Access Control and Intrusion Detection
Lesson 1: Overview of Identification and Authorization
Lesson 2: I & A Techniques
Lesson 3: Overview of IDS
Lesson 4: Intrusion Detection Systems and Intrusion Prevention Systems
Module 2: Server Management and Firewalls
Lesson 1: User Management
Lesson 2: DNS Routing and Load Balancing
Lesson 3: Overview of Firewalls
Lesson 4: Types of Firewalls
Lesson 5: DMZ and firewall features
Module 3: Security for VPN and Next Generation Networks
Lesson 1: VPN Security
Lesson 2: Security in Multimedia Networks
Lesson 3: Fax Security
Lesson 4: Link Encryption Devices

Unit 4: System and Application Security
Module 1: Security Architectures and Models
Lesson 1:Desiging Secure Operating Systems
Lesson 2: Controls to enforce security services
Lesson 3: Information flow model and Biba model
Module 2: System Security
Lesson 1: Desktop Security
Lesson 2: email security: PGP and SMIME
Lesson 3: Web Security: web authentication, SSL and SET
Module 3: OS Security
Lesson 1: OS Security Vulnerabilities, updates and patches
Lesson 2: OS integrity checks
Lesson 3: Anti-virus software
Lesson 4: Design of secure OS and OS hardening
Lesson 5: Configuring the OS for security Lesson 6: Trusted OS

 

 

laureola solutions Chennai

 

Peridot Systems Chennai

 

Prolific Training India Plc Training

 

Talhunt TTA Training center insitute in Chennai

 

Core Mind Technologies Chennai Chennai

 

CADD School Vadapalani

 

Besant technologies chennaiThink up computer institute chennai

 

IICT Chrompet - SAP Training in ChennaiSatori Technologies Chennai

 

vgit kilpaukHB Services Adyar Training Institute

 

Credo Systemz VelacheryiSpark institute, Chennai

 

sap training institutes in chennaiITBMS chennai Best Training Institute

 

7 Eleven Arthashastra Chennai

 

IIHT Vadapalani Chennai

 

HITS computer Education chennai

 

HCL Learning Velachery Chennai

 

Training course fee & Discounts

 

 

   DMCA.com Protection Status