Search Courses  in 

Get COURSE FEES & Discounts from BEST Security Auditing Institutes in Thane West!


My Name

My Mobile Number

My Email ID


Security Auditing Training Centers, Institutes & Training Course Classes in Thane West- Listings as of March 17, 2018.

As on March 17, 2018, We have total of 2 Security Auditing training institutes in and around also near to Thane West area in Mumbai with best training centers, institute address, Phone numbers, course fee, working hours and student reviews listed.



training institutes Nettech India
Mumbai - Thane West
No Reviews. Write a Review
training institute

Nettech India provides best Security Auditing Training, Security Auditing Training classes & Realtime Training Thane West.
training institutes IIHT THANE
Mumbai - Thane West
No Reviews. Write a Review
training institute
Address: 201-A, Rajdarshan Society, Dada-Patil Wadi, Thane West, Mumbai-400602 google map of 8840

IIHT THANE provides best Security Auditing Training, Security Auditing Training classes & Realtime Training Thane West.
First << 1  >> Last




Related Training Courses for Security Auditing in thane-west



Security Auditing course Content / syllabus at thane-west, mumbai.

We gathered most widely used Security Auditing course content used by training institutes in thane-west,mumbai. The Security Auditing course syllabus covers basic to advanced level and it may vary based on Security Auditing training classes offered in thane-west.


Unit 1: Security Concepts and Mechanisms

Module I: Networking Concepts Overview
Lesson 1: Basics of Communication Systems
Lesson 2: Transmission Media
Lesson 3: ISO/OSI and TCP/IP Protocol Stacks
Lesson 4: Local Area Networks
Lesson 5: Wide Area Networks
Lesson 6 : Internetworking
Lesson 7 : Packet Formats
Lesson 8 : Wireless Networks
Lesson 9 : The Internet

Module 2: Information Security Concepts
Lesson 1 : Information Security Overview
Lesson 2 : Information Security Services
Lesson 3 : Types of Attacks
Lesson 4 : Goals for Security
Lesson 5 : E-commerce Security
Lesson 6 : Computer Forensics
Lesson 7 : Steganography
Lesson 8 : Security Engineering

Module 3: Security Threats and vulnerabilities
Lesson 1 : Overview of Security threats
Lesson 2 : Hacking Techniques
Lesson 3 : Password Cracking
Lesson 4 : Insecure Network connections
Lesson 5 : Malicious Code
Lesson 6 : Programming Bugs
Lesson 7 : Cyber crime and Cyber terrorism
Lesson 8 : Information Warfare and Surveillance

Module 4: Cryptography
Lesson 1 : Introduction to Cryptography
Lesson 2 : Symmetric key Cryptography
Lesson 3 : Asymmetric key Cryptography
Lesson 4 : Message Authentication and Hash functions
Lesson 5 : Digital Signatures
Lesson 6 : Public Key infrastructure
Lesson 7 : Diffe-Hellman key exchange proptocol
Lesson 8 : Applications of Cryptography

Unit 2: Security Management
ModuleI: Security Management Practices
Lesson 1: Overview of Security Management
Lesson 2: Information Classification Process
Lesson 3: Security Policy
Lesson 4: Risk Management
Lesson 5: Security Procedures and Guidelines
Lesson 6: Business Continuity and Disa ster Recovery

Module2: Security Laws and Standards
Lesson 1: Security Assurance
Lesson 2: Security Laws
Lesson 3: International Standards
Lesson 4: Security Audit
Lesson 5: OCTAVE approach
Lesson 6: SSE-CMM Unit 3

Unit 3: Network Security
Module 1: Access Control and Intrusion Detection
Lesson 1: Overview of Identification and Authorization
Lesson 2: I & A Techniques
Lesson 3: Overview of IDS
Lesson 4: Intrusion Detection Systems and Intrusion Prevention Systems
Module 2: Server Management and Firewalls
Lesson 1: User Management
Lesson 2: DNS Routing and Load Balancing
Lesson 3: Overview of Firewalls
Lesson 4: Types of Firewalls
Lesson 5: DMZ and firewall features
Module 3: Security for VPN and Next Generation Networks
Lesson 1: VPN Security
Lesson 2: Security in Multimedia Networks
Lesson 3: Fax Security
Lesson 4: Link Encryption Devices

Unit 4: System and Application Security
Module 1: Security Architectures and Models
Lesson 1:Desiging Secure Operating Systems
Lesson 2: Controls to enforce security services
Lesson 3: Information flow model and Biba model
Module 2: System Security
Lesson 1: Desktop Security
Lesson 2: email security: PGP and SMIME
Lesson 3: Web Security: web authentication, SSL and SET
Module 3: OS Security
Lesson 1: OS Security Vulnerabilities, updates and patches
Lesson 2: OS integrity checks
Lesson 3: Anti-virus software
Lesson 4: Design of secure OS and OS hardening
Lesson 5: Configuring the OS for security Lesson 6: Trusted OS



Unix Academy Delhi Training

High Technologies Solutions - Delhi,Noida,Gurgaon

Embedded Technosolutions Mumbai


GRRAS Institute Ahmedabad Jaipur Pune

Sun Infosystems Surat

Indian Institute of Technocrafts, Kolkata

Best Oracle PHP Java Training chennaiCareer Innovation Technologies Velachery

JITS Training

IIHT Vadapalani Chennai

IIHT Bangalore

HB Services Adyar Training InstituteITBMS chennai Best Training Institute

Core Mind Technologies Chennai

RIA Institute of Technology Bangalore

HITS computer Education chennai

Systems Domain Bangalore

Dallas Technologies Bangalore

Mazenet SolutionAMEKS Infotech Ekkattuthangal, Chennai

7 Eleven Arthashastra Chennai

Peridot Systems Chennai

vgit kilpauke learning, e-publishing, technical writting courses

IICT Chrompet - SAP Training in ChennaiPMP Training in India

Training course fee & Discounts
 Protection Status