Search Courses  in 

Get COURSE FEES & Discounts from BEST Security Auditing Institutes in Cochin City!


My Name

My Mobile Number

My Email ID


Security Auditing Training Centers, Institutes & Training Course Classes in Cochin City- Listings as of March 21, 2018.

As on March 21, 2018, We have total of 4 Security Auditing training institutes in and around also near to Cochin City area in Kochi-Cochin with best training centers, institute address, Phone numbers, course fee, working hours and student reviews listed.



Kochi-Cochin - Cochin City
training institute


APTECH COMPUTER EDUCATION at Cochin City - class room photo_12303 APTECH COMPUTER EDUCATION at Cochin City - class room photo_12302 APTECH COMPUTER EDUCATION at Cochin City - live discussions photo_12305 
Address: 1st floor,Krishna Building,Palarivattom,S N Junction, Civil Line Road,Opp Sree Narayana Guru Statue, Kochi, Kerala 682025 google map of 18836

APTECH COMPUTER EDUCATION provides best Security Auditing Training, Security Auditing Training classes & Realtime Training Cochin City.
training institutes HASH LABS
Kochi-Cochin - Cochin City
No Reviews. Write a Review
training institute
Address: M.K.K Nair Road, Palarivattom, Cochin-682025 google map of 8985

HASH LABS provides best Security Auditing Training, Security Auditing Training classes & Realtime Training Cochin City.
First << 1  >> Last




Related Training Courses for Security Auditing in cochin-city



Security Auditing course Content / syllabus at cochin-city, kochi-cochin.

We gathered most widely used Security Auditing course content used by training institutes in cochin-city,kochi-cochin. The Security Auditing course syllabus covers basic to advanced level and it may vary based on Security Auditing training classes offered in cochin-city.


Unit 1: Security Concepts and Mechanisms

Module I: Networking Concepts Overview
Lesson 1: Basics of Communication Systems
Lesson 2: Transmission Media
Lesson 3: ISO/OSI and TCP/IP Protocol Stacks
Lesson 4: Local Area Networks
Lesson 5: Wide Area Networks
Lesson 6 : Internetworking
Lesson 7 : Packet Formats
Lesson 8 : Wireless Networks
Lesson 9 : The Internet

Module 2: Information Security Concepts
Lesson 1 : Information Security Overview
Lesson 2 : Information Security Services
Lesson 3 : Types of Attacks
Lesson 4 : Goals for Security
Lesson 5 : E-commerce Security
Lesson 6 : Computer Forensics
Lesson 7 : Steganography
Lesson 8 : Security Engineering

Module 3: Security Threats and vulnerabilities
Lesson 1 : Overview of Security threats
Lesson 2 : Hacking Techniques
Lesson 3 : Password Cracking
Lesson 4 : Insecure Network connections
Lesson 5 : Malicious Code
Lesson 6 : Programming Bugs
Lesson 7 : Cyber crime and Cyber terrorism
Lesson 8 : Information Warfare and Surveillance

Module 4: Cryptography
Lesson 1 : Introduction to Cryptography
Lesson 2 : Symmetric key Cryptography
Lesson 3 : Asymmetric key Cryptography
Lesson 4 : Message Authentication and Hash functions
Lesson 5 : Digital Signatures
Lesson 6 : Public Key infrastructure
Lesson 7 : Diffe-Hellman key exchange proptocol
Lesson 8 : Applications of Cryptography

Unit 2: Security Management
ModuleI: Security Management Practices
Lesson 1: Overview of Security Management
Lesson 2: Information Classification Process
Lesson 3: Security Policy
Lesson 4: Risk Management
Lesson 5: Security Procedures and Guidelines
Lesson 6: Business Continuity and Disa ster Recovery

Module2: Security Laws and Standards
Lesson 1: Security Assurance
Lesson 2: Security Laws
Lesson 3: International Standards
Lesson 4: Security Audit
Lesson 5: OCTAVE approach
Lesson 6: SSE-CMM Unit 3

Unit 3: Network Security
Module 1: Access Control and Intrusion Detection
Lesson 1: Overview of Identification and Authorization
Lesson 2: I & A Techniques
Lesson 3: Overview of IDS
Lesson 4: Intrusion Detection Systems and Intrusion Prevention Systems
Module 2: Server Management and Firewalls
Lesson 1: User Management
Lesson 2: DNS Routing and Load Balancing
Lesson 3: Overview of Firewalls
Lesson 4: Types of Firewalls
Lesson 5: DMZ and firewall features
Module 3: Security for VPN and Next Generation Networks
Lesson 1: VPN Security
Lesson 2: Security in Multimedia Networks
Lesson 3: Fax Security
Lesson 4: Link Encryption Devices

Unit 4: System and Application Security
Module 1: Security Architectures and Models
Lesson 1:Desiging Secure Operating Systems
Lesson 2: Controls to enforce security services
Lesson 3: Information flow model and Biba model
Module 2: System Security
Lesson 1: Desktop Security
Lesson 2: email security: PGP and SMIME
Lesson 3: Web Security: web authentication, SSL and SET
Module 3: OS Security
Lesson 1: OS Security Vulnerabilities, updates and patches
Lesson 2: OS integrity checks
Lesson 3: Anti-virus software
Lesson 4: Design of secure OS and OS hardening
Lesson 5: Configuring the OS for security Lesson 6: Trusted OS



Unix Academy Delhi Training

High Technologies Solutions - Delhi,Noida,Gurgaon

Embedded Technosolutions Mumbai


GRRAS Institute Ahmedabad Jaipur Pune

Sun Infosystems Surat

Indian Institute of Technocrafts, Kolkata

JITS Training

Dallas Technologies Bangalore

HB Services Adyar Training InstituteITBMS chennai Best Training Institute

vgit kilpauke learning, e-publishing, technical writting courses

7 Eleven Arthashastra Chennai

HITS computer Education chennai

Best Oracle PHP Java Training chennaiCareer Innovation Technologies Velachery

RIA Institute of Technology Bangalore

IIHT Bangalore

IIHT Vadapalani Chennai

Peridot Systems Chennai

Mazenet SolutionAMEKS Infotech Ekkattuthangal, Chennai

IICT Chrompet - SAP Training in ChennaiPMP Training in India

Systems Domain Bangalore

Core Mind Technologies Chennai

Training course fee & Discounts
 Protection Status