CISS (certified information security specialist) Training
This course is designed for individuals who are willing to mould their career in information Security Domain.
This course divides into 5 phases.
First phase contains different servers using regularly in production environment of an organization, Configure & Deploy servers in Windows or Linux infrastructure, Day by day reporting & auditing of servers, Patch Management, Troubleshooting regular issues, Upgrading operating systems, Hardening Servers , Designing & implementing Security policies.
Second phase covers in-depth topic of Networks & different network technologies such as Wan connectivity here we discuss Wan protocols, Network mediators, Media, Configuring Wan connectivity using Routers, Configuring Routing protocols, Implementing Access control lists, Designing Router level & Switch level security implementations, VLAN configurations, Inter VLAN connectivity, Trunking configurations, Troubleshooting network devices.
Third phase completely discuss about Hackers & Hacking Methodologies, different security testing methodologies, how hackers perform network scans, Exploitation, Social engineering attacks, Man in the middle attacks, Web site defacements, password hacking, hiding identity, Deleting evidences, keyloggers, Trojans, Backdooring techniques & dangerous Denial of service attacks and Distributed denial of service attacks, and different counter measures have to be taken care by ethical hackers & identifying security loop-holes by running vulnerability assessments, configure honeypots to trap hackers.
Fourth phase corely concentrates on Investigating hacking incidents, Cyber crime Mechanism, Cyber pornography, Threat mail analysis, Sexual harassment cases, Internet misusage. This phase also discuss Log Analysis, Incidence response, Network forensics, packet analysis & cyber laws.
Final module demonstrates configuration of an enterprise firewall to defend an organization against today’s emerging threats, Building a firewall, Configuring policies, Natting, Antivirus & antispam solutions, Integrating firewalls with authentication servers, Implementing Intrusion detection & Intrusion prevention systems, Configuring secure VPN tunnels between multiple branches, testing periodically existing infrastructures security measurements, Updating firewall rules.