Академический Документы
Профессиональный Документы
Культура Документы
Courses Covered:
Features:
a. 12 Months Diploma
b. 10 Certifications
c. 6 Months Industrial Training Certificate
d. 2 Projects and their Certificates
e. International Validity of the Certifications & the Diploma
f. Lifetime Cloud Subscription Inclusive
g. 100% Job Assistance
Course Module
Certified Information Security Expert Level 1 Modules:-
Web Architectures
Web Application Introduction
PHP-Basics
Sessions & Cookies
XSS Attacks
Advanced SQLI
Cross Site Request Forgery
Session Hijacking
Web based DDOS Attacks
Cookie Poisoning
PHP Injection
Web Based Worms
Flash based Web Attacks
I-Frame based Web Attacks
Clickjacking
Attack frameworks: AttackAPI & BeEF
Honeytokens
OWASP Top 10
Metasploit and Web Application
PHP Curl
Automated Bots
Phishing 2.0
Brute forcing Web Applications
Compliance Methodologies and Legalities
Capture the Flag Exercise
Network Topology
Open Systems Interconnectivity Model
TCP/IP In-depth
WAP, NAT, DNS and ICMP
Internet Routing
Advanced Port Scanning
Sniffing Attacks
Masquerading Attacks
Advanced DOS and DDOS
Session Hijacking Attacks
Network Operations Center - Security
Network Traffic Analysis
Network Vulnerability Assessment
Network Penetration Testing
Intrusion Detection System
Snort 101
OSSEC 102
Intrusion Prevention System
Firewalls (Installation, Configuration and Usage)
OS Hardening for Networks - Linux and Windows
Cryptography - Introduction
Symmetric Key Encryption
Asymmetric Key Encryption
Hash functions
Trust models
VLAN - Security
VPN - Security
Wireless Networks - Introduction
Radio Frequency Essentials
Wireless Security - Basics
Wireless Threats
WEP Security
WPA/WPA2 Security
Secure Wireless Infrastructure Deployment
DNS Tunneling
Network Forensic Methodology
Network Evidence Acquisition
OS Logs and Splunk
On-demand Self-service - The service of cloud is available all the time and it
provides computing capabilities on-demand of the user automatically.
Distributed Storage – This service allows many users to have access to data. It
means multiple user and applications work more efficiently with less cost by
sharing common infrastructure using cloud computing.
Rapid Elasticity – It means this service is flexible and can be scaled up or down
according to the business requirements. Computing resources and programs can be
used based on the requirement and the user have to pay only for the usage.
Measured Service – The usage metering is also available that helps to watch how
much resources are used by the user and the user only pay what they use.
Low Cost – By using the cloud computing, the cost will be reduced because to take
the service of cloud computing, IT companies need not to set its own infrastructure
and pay as per the usage of resources.
Maintenance – Maintenance of cloud computing application and resources is easier,
because they do not required to be installed each user’s computer and can be
accessed from different locations.
Basic Concepts
There are certain services and models working behind the scene making the cloud
computing accessible to end users. Following are the working models for cloud
computing:
Deployment Models
Service Models
Public Cloud
Public Cloud infrastructure is owned by a third party cloud service provider who makes
cloud services available to the general public. In Public Cloud, customers need to pay only
for the resources they use. It is a type of cloud hosting that allows the accessibility of
systems & its services to its users easily. This gives them the flexibility to increase or
decrease the resources to meet the market demand. Some of the examples of those
companies which provide public cloud facilities are IBM, Google, Amazon, Microsoft, etc.
Private Cloud
As the name suggest, it is privately owned cloud service. The private cloud allows systems
and the services to be accessible within an organization. Private cloud is operated only
within a particular organization. This model is most popular in those organizations where
user have complete control over security aspects.
Community Cloud
In this cloud all the information is shared manually among different organizations that
belong to the same community or area. Community cloud is maintained and used by a
group of organizations with shared concern.
Hybrid Cloud
Hybrid cloud is a blend of private and public models. In this model all the critical activities
that are sensitive such as organization data handling performed by the private cloud and
non-critical activities such as development and test workloads are performed by the
public cloud.
Unlimited Storage Facility –The cloud offers unlimited data storage and
processing power. It can offers you a huge amount of storage capacity or more than
that if required.
Backup and Recovery – Cloud computing provides an easier and less resource
intensive method to protect your data because they distribute backups between
data centers in different countries to ensure reliable access all at the time.
Enhanced Security – Cloud computing provides more security than local servers
and the user need not to worry about losing sensitive data and useful applications
due to the natural disaster or computer meltdown.
High Speed – Cloud computing reduces the time and cost of IT resources. It helps
you to deploy the service quickly in fewer clicks. This fast deployment lets you get
the resources required for your system within fewer minutes.
Low Cost – Cloud computing reduces the software cost because you don’t need to
purchase and install separate software packages for each computer in any
organization.
Virtualization
Virtualization refers to creation of virtual version of something such as a desktop, storage
device, an operating system, networking resources and server. It is a process of deploying
multiple machines virtually on a host. The main goal of virtualization is to manage
workloads to make it more scalable. Virtualization can be applied to a wide range such as
operating system virtualization, hardware-level virtualization and server virtualization.
Virtualization technology is hardware reducing, cost saving and energy saving technology
that is rapidly transforming the fundamental way of computing.
Cloud Security
Cloud Security is a group of policies, technologies and controls adapted to protect data,
applications and the infrastructure of cloud computing. We can say that it is a subdomain
of computer security, network security etc. Cloud computing is increasing day by day and
it has been adapted by most of the companies. Cloud Security is a major concern now a
days. All the data that is stored on the cloud should be in encrypted form. Proxy and
Brokerage services should be adapted to restrict the client from accessing the shared data
directly. Encryption helps to protect transferred data as well as stored data in the cloud.
Encryption also restricts the unauthorized access of the data but it doesn’t prevent the
loss of the data.
Cloud Customer must define their cloud security requirements before selecting a
Cloud Service Provider.
Cloud Customer should be able to harmonize their cloud and traditional IT
delivery resources.
Cloud Customer establish contractual clarity on the roles and responsibilities of
each party.
Cloud Customer should develop a responsibility matrix that defines the security
roles and responsibilities for each vendor such as Cloud Service Provider.
Cloud Security Tools
Skyhigh Networks – Skyhigh Networks discovers, analyzes and secures your use of
cloud applications. It uses logs from your existing firewalls, proxies and gateways to
quickly discover what discover what cloud apps your employees are using. It
provides you with a customizable risk assessment of all the cloud apps that are
currently being used.This tool helps to detect potential data leaks.
Netskope – It is a service that discovers and monitors cloud apps on network. It
monitors users, sessions, shared and downloaded content as well as the shared
content details and provides detailed analytics based on this information.
Okta – This tool is different from all other tools. Okta’s goal is to provide secure Single
Sign-On (SSo) for all the cloud, on- premise and mobile applications used in your business.
Okta is pre-integreted with common business applications from Google, Microsoft etc.