Security Engineering Package

A+ Essentials

+ Computer Components Identification
+ Assemble and Disassemble
Computer Components
+ Components in Portable Computers
+ Devices Installation and Configuration
+ Characteristics of Cabling and their Connectors
+ Common IDE, SCSI and Peripheral Devices
+ Optimize PC Operations Optimization
+ Determine the Issues that must be
Considered when upgrading a PC
+ Popular CPU Chips
+ Types of Memory (RAM)
+ Types of Motherboards and their Components
+ Printer Technologies, Interfaces 
and Options/Upgrades
+ Troubleshoot Common Printer Problems
+ Operating System Fundamentals OS Installation
+ Common Error Codes Interpretation
+ Networking Capabilities of Windows
+ Basic Internet Protocols and Terminologies
+ Procedures for Establishing Internet Connectivity

Installing and Configuring Windows 7 (MCTS)

+ Installing Windows 7
+ Preparing the Windows 7 Installation Source
+ User and Group Management
+ Password Reset Disk
+ Parental Control
+ Upgrading to Windows 7
+ User Profiles Management
+ System Images Capturing
+ Virtual Hard Disk Files
+ Application Compatibility
+ Introducing Windows 7
+ Windows Aero and Mouse operations
+ Switching Users
+ Disks and Device Drivers
+ Network Settings
+ IPv4/IPv6 Configuration
+ Network Configuration
+ Folder and File Access
+ BranchCache
+ Printers in Windows 7
+ Windows 7 Desktops Security
+ Windows 7 Client Computers
+ Mobile Computing and Remote Access in Windows 7

MCITP Server Administration: Windows Server 2008 Active Directory, Configuring

+ Windows Server 2008 Active Directory
+ Organizational Units and Domain Controllers
+ Global Catalog
+ Operations Masters and Server Manager
+ Global Catalog Servers
+ RID Master
+ Transferring and Seizing of Operations Master
Roles
+ Active Directory and DNS
+ Command-Line DNS Server Administration
+ Zone Transfers and Replication
+ Active Directory Sites and Replication
+ Active Directory Sites
+ Active Directory Lightweight Directory Services
+ (AD LDS)
+ Active Directory Rights Management Services
+ (AD RMS)
+ Read-Only Domain Controllers
+ Active Directory Federation Services (ADFS)
+ Windows Server 2008 Virtualization
+ Active Directory Objects and Trusts
+ Organizational Units
+ Group Membership
+ Shell Access Policies
+ Group Policy to Deploy Software
+ Backing Up and Recovering Active Directory
+ Use of Windows Server Backup
+ Active Directory Certificate Services
+ Installing Active Directory Certificate Services
+ Certificate Templates and Revocation

CCNA

+ Fundamentals of Networking
+ OSI Reference Model and TCP/IP Protocol Suite
+ Functions of Transport Layer Protocols of TCP/IP
+ Functions of Internet Layer Protocol
+ IP Addressing V4
+ IP Subnetting
+ Math Operations Used When Subentting
+ IP Routing
+ Three layer Hierarchical model
+ VLSM and Route Summarization
+ Auto Summarization
+ Packet delivery process
+ Managing Router Startup and Configuration
+ Router Configuration and Verification
+ Interface Configuration and Verification
+ Operating Cisco IOS
+ Device Configuration, IOS backup and Restoration
+ Different Forms of Routing
+ Link State Routing Protocol
+ Dynamic Routing Protocol
+ Advanced Dynamic Routing Protocols
+ EIGRP
+ OSPF
+ Fundamentals of LANs
+ LAN Switching
+ Ethernet Switch Configuration
+ Configuring the Switch for Remote Access
+ Port Security
+ Troubleshooting LAN Switching
+ VLAN and Trunks
+ VLAN Trunking Protocol (VTP)
+ Preventing Bridging Loops
+ Inter VLAN Routing
+ Access Control List
+ Standard ACL Operation
+ Extended ACL Operation
+ ACL Editing and Troubleshooting
+ Conserving IP Address Space
+ Network Address Translation (NAT)
+ IP version 6
+ Different WAN Technologies
+ Advanced Wide Area Network
+ Frame Relay
+ Virtual Private Network
+ Wireless Network Technologies
+ PPP Concepts & Configuration
+ Securing the Router CLI
+ Remote Access to the router using Telnet and SSH
+ Network Utilities
+ Troubleshooting Routing Protocols

CCSA (Checkpoint Certified Security Administrator)

1. DefiningaFirewall
+ What is a Firewall?
+ Type of the Firewall
+ Packet Filtering
+ Application Layer Gateway (Proxy)
+ Check Point’s Stateful Inspection Technology
2. CheckPoint Firewall-1 Architecture
+ How Check Point Firewall-1 Works?
+ Check Point Firewall-1 Components and Modules
+ Check Point Firewall-1 Kernel
+ Check Point Firewall-1 Daemon
3. CheckPoint Firewall-1 Overview
+ Methods of securing networks
+ Check Point Firewall-1 Architecture
+ Secure Internal Communications
+ Distributed client/server model
+ Application Intelligence technology
4. Security Policy
+ Security Policy definition
+ SmartDashboard
+ Access control for administrators
+ Creating the Rule Base
+ Implicit and explicit rules
+ Command-line options for the Security Policy
5. FireWall-1 Setup and Installation
+ Pre-installation Configuration
+ System Requirement
+ How to install license
+ Install additional firewall module
6. Working with the Smart Dashboard
+ Masking and disabling rules
+ Uninstalling a Security Policy
+ Improving VPN-1/FireWall-1 performance
7. Understanding Rule Base Order
+ What is a Rule Base
+ How to create Rule Base
+ Important of the Rule Base Order
+ Implicit and Explicit Rules
+ FW1 Control Connections
+ Outgoing Packets
+ Additional Settings
+ Implicit Drop Rule
8. Troubleshooting the Security Policy
+ Maximum number of rules and objects
+ Deleting Administrator accounts
+ Deleting Administrator accounts
9. Detecting Hacking Method–Spoofing
+ What is Spoofing
+ Anti-Spoofing Configuration
10. Advanced Security Policy
+ Masking Rules
+ Disabling Rules
+ Uninstalling a Security Policy
+ Security Policy File
+ Command Line Options for the Security Policy
11. Log Management
+ Log Viewer GUI
+ Log Viewer Modes
+ Creating and Selecting Selection Criteria
+ Blocking Connections
+ Block Intruder
+ System Status GUI
+ System Status Logon
+ Log Viewer Modes
+ Creating and Selecting Selection Criteria
+ Blocking Connections
+ Block Intruder
12. Authentication and Authentication Parameters
+ Understanding Authentication
+ How User Authentication Works
+ Type of Authentication
+ User Authentication
+ Client Authentication
+ Session Authentication
13. Authentication Schemes
+ Defining a User Template
+ Defining Users and Groups
14. Network Address Translation(NAT)
+ How NAT Works
+ Type of NAT
+ Static NAT
+ Hide NAT
+ Address Resolution Protocol (ARP)
+ NAT Routing
+ Static NAT and Anti-Spoofing
+ Troubleshooting NAT

CCNA Security

Understanding Network Security Principles
+ Developing a Secure Network
+ Defending the Perimeter
+ Configuring AAA
+ Securing the Router
+ Securing Layer 2 Devices
+ Implementing Endpoint Security
+ Providing SAN Security
+ Exploring Secure Voice Solutions
+ Using Cisco IOS Firewalls to Defend the Network
+ Using Cisco IOS IPS to Secure the Network
+ Designing a Cryptographic Solution
+ Implementing Digital Signatures
+ Exploring PKI and Asymmetric Encryption
+ Building a Site-to-Site IPsec VPN Solution

Network + Essentials

+ Logical or Physical Network Topologies 
+ Networking Standards
+ Characteristics of Different Types of Cables
+ Different media Connectors and Describe
their uses
+ Purposes, Features and Functions of
Network Components
+ General Characteristics of the Different
wireless technologies
+ Different Network Protocols
+ Classful IP and Their Subnet Masks
+ Subnetting
+ Private and Public network addressing schemes
+ WAN Technologies
+ Security protocols and authentication protocols
+ Basic capabilities different server 
operating systems
+ Antivirus software
+ Fault Tolerance
+ Network Utility to Troubleshoot Networks
+ Impact of modifying, adding or removing
network services
+ Network Troubleshooting with Physical Topology

MCITP Server Administration: Windows Server 2008 Administration

+ Windows Server 2008 Installation and Administration
+ Automated Server Deployment
+ Windows Deployment Services and Network
Connectivity
+ IPv6 in Windows Server 2008
+ Domain and Forest Functionality
+ Group Policy in Windows Server 2008
+ Application Servers and Deployment
+ Server and Application Virtualization
+ Terminal Services RemoteApp
+ File and Print Servers
+ Provisioning Data and Credential Delegation
+ Remote Administration Technologies
+ Windows Server 2008 Patch Management
Strategies
+ Replica Mode and Autonomous Mode
+ WSUS (Windows Server Update Services)
+ Server Security and Remote Access
+ VPN (Virtual Private Network) Protocols
+ Network Policy Server and Remote Access
Accounting
+ Network Access Protection
+ Storage Area Networks and Logical Unit Numbers
(LUN)
+ Certificate Services Role-Based Administration
+ Credential Roaming and Web Enrollment Support
+ Online Responder for Certificate Services
+ Network Device Enrollment Service
+ Clustering and High Availability
+ Backing Up Data and Disaster Recovery

MCITP Server Administration: Windows Server 2008 Network, Infrastructure, Configuring

+ Windows Server 2008 Installation
+ DNS Server Role and Domain Name System
+ Recursive and Iterative Queries
+ Forward and Windows internet Name System
+ Overview of the DHCP Server Role
+ Dual Layer Architecture
+ ISATASP Tunneling and Port Proxy
+ Transitioning from IPv4 to IPv6
+ Network and VPN Access
+ Network Policy Server
+ RADIUS Clients and Servers
+ NPS Authentication Methods
+ Log File Properties
+ SQL Server Logging
+ Overview of IPsec
+ Storage Technologies
+ Windows Server 2008 Storage Management Overview
+ Common Capacity Management Challenges
+ File Server Resource Manager
+ Quota Management
+ Network load balancing manager
+ Security and Audit policy
+ WSUS Administration

Ethical Hacking

+ Introduction to Ethical Hacking
+ Foot printing and Reconnaissance
+ Scanning Networks
+ Enumeration
+ System Hacking
+ Trojans and Backdoors
+ Viruses and Worms
+ Sniffers
+ Social Engineering
+ Denial of Service
+ Session Hijacking
+ Hacking Webservers
+ Hacking Web Applications
+ SQL Injection
+ Hacking Wireless Networks
+ Evading IDS, Firewalls, and Honeypots
+ Buffer Overflow
+ Cryptography
+ Penetration Testing
+ Linux Basics Hacking
+ Physical Security
+ Hacking Tools

Cisco ASA

Pre-Production Design
+ Choose ASA Perimeter Security technologies/features to implement HLD based on givensecurity requirements
+ Choose the correct ASA model to implement HLD based on given performance requirements
+ Create and test initial ASA appliance configurations using CLI
+ Determine which ASA licenses will be required based on given requirements
Complex Operations Support
+ Optimize ASA Perimeter Security features performance, functions, and configurations
+ Create complex ASA security perimeter policies such as ACLs, NAT/PAT, L3/L4/L7 statefulinspections, QoS policies, cut-thru proxy, threat detection, botnet detection/filter using CLIand/or ASDM
+ Perform initial setup on the AIP-SSM and CSC-SSM using CLI and/or ASDM
+ Configure, verify and troubleshoot High Availability ASAs (A/S and A/A FO) operations usingCLI and/or ASDM
+ Configure, verify and troubleshoot static routing and dynamic routing protocols on the ASAusing CLI and/or ASDM
+ Configure, verify and troubleshoot ASA transparent firewall operations using CLI
+ Configure, verify and troubleshoot management access/protocols on the ASA using CLI and/or ASDM
Describe Advanced Troubleshooting
+ Advanced ASA security perimeter configuraiton/software/hardware troubleshooting using CLIand/or ASD fault finding and repairing

Courses

Curriculum of all the programs are as per International Standards set by Principles of the resective technology. 
To join for any of the courses or for further details reach us @ IIHT-VPN or call us at 9677055562 / 044-43069570.

Why IIHT-Vadapalani?

  • International Standard Syllabus.
  • International Standard Materials.
  • State of the Art Infrastructure.
  • Qualified & Service Minded Mentors i.e, Trainers.
  • Convenient Timings (exclusive Day, Evening, Weekend batches for Employed & College Students).
  • Real-Time, Practicals, Presentations, Videos, Debates, Assignments, Case Study, based Trainings.
  • Unlimited Evaluations during training sessions.
  • Unlimited Lab Access.
  • Life Long Support System.
  • Exclusive Communication & Attitude Development training.
  • Exhaustive Interview Training.
  • Unique Employability Training.
  • Special Apperance of Real-Time Experts for considerable duration, at the end of course.
  • Unlimited Interviews.
  • After-Interview Training at the end of each interview.
  • Assured Placement Assistance for continous 3 positions of the Job.
  • Technical Assistance on the Real Time Scenarios, even after completing the course and got Placed.
  • Life long Technology, Industry, Placement Updates.
  • Connectivity to the Industrial Experts for rich Technical aid for entire life time.
  • Access to Online – technology, Career Resources.
  • Exclusive International Certification Preparation Training.
  • Convenient transfer facility to 220+ branches across the Globe
Top