Hyderabad    :  040-66022317
Bangalore     :  080-60505533
Vizag            :  
Tirupati         :  
Chennai        :  044-65453003

CISS Training

CISS (certified information security specialist) Training

This course is designed for individuals who are willing to mould their career in information Security Domain.

This course divides into 5 phases.

First phase contains different servers using regularly in production environment of an organization, Configure & Deploy servers in Windows or Linux infrastructure, Day by day reporting & auditing of servers, Patch Management, Troubleshooting regular issues, Upgrading operating systems, Hardening Servers , Designing & implementing Security policies.

Second phase covers in-depth topic of Networks & different network technologies such as Wan connectivity here we discuss Wan protocols, Network mediators, Media, Configuring Wan connectivity using Routers, Configuring Routing protocols, Implementing Access control lists, Designing Router level & Switch level security implementations, VLAN configurations, Inter VLAN connectivity, Trunking configurations, Troubleshooting network devices.

Third phase completely discuss about Hackers & Hacking Methodologies, different security testing methodologies, how hackers perform network scans, Exploitation, Social engineering attacks, Man in the middle attacks, Web site defacements, password hacking, hiding identity, Deleting evidences, keyloggers, Trojans, Backdooring techniques & dangerous Denial of service attacks and Distributed denial of service attacks, and different counter measures have to be taken care by ethical hackers & identifying security loop-holes by running vulnerability assessments, configure honeypots to trap hackers.

Fourth phase corely concentrates on Investigating hacking incidents, Cyber crime Mechanism, Cyber pornography, Threat mail analysis, Sexual harassment cases, Internet misusage. This phase also discuss Log Analysis, Incidence response, Network forensics, packet analysis & cyber laws.

Final module demonstrates configuration of an enterprise firewall to defend an organization against today’s emerging threats, Building a firewall, Configuring policies, Natting, Antivirus & antispam solutions, Integrating firewalls with authentication servers, Implementing Intrusion detection & Intrusion prevention systems, Configuring secure VPN tunnels between multiple branches, testing periodically existing infrastructures security measurements, Updating firewall rules.

Book Online Download Soft Copy Request Course Details

  • rajeeve placement form fls

    Name: Rajeev Designation: Security Analyst Company: RED SHIFT

  • cnfs training institute

    Name: Avinash Designation: Remediation Engineer Company: A

  • pardhiv

    Name: Pardhiv reddy Designation: Security Analyst Company: FI

  • jagdeesh

    Name: Jagdeesh Kumar Designation: Security Analyst Company: Allied

  • sisir

    Name: Sisir Kumar Designation: Sr. Security Consultant Company:

  • venkatesh

    Name: Venkatesh Designation: System Admin

  • sampath

    Name: Sampath varma Designation: System Administrator Company:

  • kanisha

    Name: Kanishka Designation: Security Analyst Company: Torrid

  • pavan-kumar

    Name: Pavankumar Designation: Network Administrator Company: Trace Network S

  • rajesh-kumar

    Name: Rajesh Kumar Designation: ISMS Company: Exp