space
Search Courses  in 

Get COURSE FEES & Discounts from BEST Security Auditing Institutes in Chinchwad East!

 

My Name

My Mobile Number

My Email ID

 

Security Auditing Training Centers, Institutes & Training Course Classes in Chinchwad East- Listings as of June 21, 2018.

As on June 21, 2018, We have total of 1 Security Auditing training institutes in and around also near to Chinchwad East area in Pune with best training centers, institute address, Phone numbers, course fee, working hours and student reviews listed.

 

 

training institutes Blend InfoTech
Pune - Chinchwad East
Best training institute
Address: A3-1st Floor, Sunehara Plaza Ganesh Nagar, Opp Ganesh Mandir, Dange Chowk, Thergown Chinchwad East Pune-411033 google map of 12187

Blend InfoTech is also known as "IT Training Hub", having its Corporate Office at Pune. Blend is a company started by a group of professionals with vision to excel in the field of IT. Blend InfoTech provides best Security Auditing Training, Security Auditing Training classes & Realtime Training Chinchwad East.
 
First << 1  >> Last

 

 

 

Related Training Courses for Security Auditing in chinchwad-east

 

 

Security Auditing course Content / syllabus at chinchwad-east, pune.

We gathered most widely used Security Auditing course content used by training institutes in chinchwad-east,pune. The Security Auditing course syllabus covers basic to advanced level and it may vary based on Security Auditing training classes offered in chinchwad-east.

 

Unit 1: Security Concepts and Mechanisms

Module I: Networking Concepts Overview
Lesson 1: Basics of Communication Systems
Lesson 2: Transmission Media
Lesson 3: ISO/OSI and TCP/IP Protocol Stacks
Lesson 4: Local Area Networks
Lesson 5: Wide Area Networks
Lesson 6 : Internetworking
Lesson 7 : Packet Formats
Lesson 8 : Wireless Networks
Lesson 9 : The Internet

Module 2: Information Security Concepts
Lesson 1 : Information Security Overview
Lesson 2 : Information Security Services
Lesson 3 : Types of Attacks
Lesson 4 : Goals for Security
Lesson 5 : E-commerce Security
Lesson 6 : Computer Forensics
Lesson 7 : Steganography
Lesson 8 : Security Engineering

Module 3: Security Threats and vulnerabilities
Lesson 1 : Overview of Security threats
Lesson 2 : Hacking Techniques
Lesson 3 : Password Cracking
Lesson 4 : Insecure Network connections
Lesson 5 : Malicious Code
Lesson 6 : Programming Bugs
Lesson 7 : Cyber crime and Cyber terrorism
Lesson 8 : Information Warfare and Surveillance

Module 4: Cryptography
Lesson 1 : Introduction to Cryptography
Lesson 2 : Symmetric key Cryptography
Lesson 3 : Asymmetric key Cryptography
Lesson 4 : Message Authentication and Hash functions
Lesson 5 : Digital Signatures
Lesson 6 : Public Key infrastructure
Lesson 7 : Diffe-Hellman key exchange proptocol
Lesson 8 : Applications of Cryptography

Unit 2: Security Management
ModuleI: Security Management Practices
Lesson 1: Overview of Security Management
Lesson 2: Information Classification Process
Lesson 3: Security Policy
Lesson 4: Risk Management
Lesson 5: Security Procedures and Guidelines
Lesson 6: Business Continuity and Disa ster Recovery

Module2: Security Laws and Standards
Lesson 1: Security Assurance
Lesson 2: Security Laws
Lesson 3: International Standards
Lesson 4: Security Audit
Lesson 5: OCTAVE approach
Lesson 6: SSE-CMM Unit 3

Unit 3: Network Security
Module 1: Access Control and Intrusion Detection
Lesson 1: Overview of Identification and Authorization
Lesson 2: I & A Techniques
Lesson 3: Overview of IDS
Lesson 4: Intrusion Detection Systems and Intrusion Prevention Systems
Module 2: Server Management and Firewalls
Lesson 1: User Management
Lesson 2: DNS Routing and Load Balancing
Lesson 3: Overview of Firewalls
Lesson 4: Types of Firewalls
Lesson 5: DMZ and firewall features
Module 3: Security for VPN and Next Generation Networks
Lesson 1: VPN Security
Lesson 2: Security in Multimedia Networks
Lesson 3: Fax Security
Lesson 4: Link Encryption Devices

Unit 4: System and Application Security
Module 1: Security Architectures and Models
Lesson 1:Desiging Secure Operating Systems
Lesson 2: Controls to enforce security services
Lesson 3: Information flow model and Biba model
Module 2: System Security
Lesson 1: Desktop Security
Lesson 2: email security: PGP and SMIME
Lesson 3: Web Security: web authentication, SSL and SET
Module 3: OS Security
Lesson 1: OS Security Vulnerabilities, updates and patches
Lesson 2: OS integrity checks
Lesson 3: Anti-virus software
Lesson 4: Design of secure OS and OS hardening
Lesson 5: Configuring the OS for security Lesson 6: Trusted OS

 

 

Radical technologies Pune

Prolific Training India Plc Training

SHRISTI TECHNOLOGY LABS

MagDiSoft Training Pune

Techdata solution Pune

SAP Training in PuneCISCO CCNA training institutes in Pune

Aryan Tech Solutions Pune

BigTech Consulting Pune

Add your institute in PunePMP Training in India

CNC Web World PuneMc Square Education Pvt.Ltd Pune

Blend Infotech Pune

GNS Technologies Pune

IIHT Pune


Training course fee & Discounts

 

 

   DMCA.com Protection Status