#1
8th November 2015, 01:35 PM
| |||
| |||
Network Security Training Online
I am interested in the field of Network Security and for this I am planning to do Network Security Training Online looking for the online certificates. Will you please provide me lists of Network Security Training Online courses available along with modules list?
|
#2
8th November 2015, 01:36 PM
| |||
| |||
Re: Network Security Training Online
As per your request here I am providing you the lists of courses related to Network Security Training which you can do online. Please check the below list of courses: 1. CPTC – Certified Penetration Testing Consultant 2. CPTE – Certified Penetration Testing Engineer 3. CompTIA – Security+ 4. CSTA – Certified Security Testing Associate 5. GPEN – GIAC Certified Penetration Tester 6. OSCP – Offensive Security Certified Professional 7. CEH – Certified Ethical Hacker 8. ECSA – EC-Council Certified Security Analyst 9. CEPT – Certified Expert Penetration Tester Here is a list of the modules you would have to learn if you decide to sit for the Security+ exam and certification. 1.0 Network Security 1.1 Explain the security function and purpose of network devices and technologies 1.2 Apply and implement secure network administration principles 1.3 Distinguish and differentiate network design elements and compounds 1.1 Explain the security function and purpose of network devices and technologies 1.4 Implement and use common protocols 1.5 Identify commonly used default network ports 1.6 Implement wireless network in a secure manner 2.0 Compliance and Operational Security 2.1 Explain the security function and purpose of network devices and technologies 2.2 Carry out appropriate risk mitigation strategies 2.3 Explain the security function and purpose of network devices and technologies 2.4 Explain the importance of security related awareness and training 2.5 Compare and contrast aspects of business continuity 2.7 Explain the impact and proper use of environmental controls 2.8 Execute disaster recovery plans and procedures 3.0 Threats and Vulnerabilities 3.1 Analyze and differentiate among types of malware 3.2 Analyze and differentiate among types of attacks 3.3 Analyze and differentiate among types of social engineering 3.4 Analyze and differentiate among types of wireless attacks 3.5 Analyze and differentiate among types of application attacks 3.6 Analyze and differentiate among types of mitigation and deterrent techniques 3.7 Implement assessment tools and techniques to discover security threats and vulnerabilities 3.8 Within the realm of vulnerability assessments, explain the proper use of penetration testing versus vulnerability scanning 4.0 Application, Data and Host Security 4.1 Explain the importance of application security 4.2 Carry out appropriate procedures to establish host security 4.3 Explain the importance of data security 5.0 Access Control and Identity Management 5.1 Explain the function and purpose of authentication services 5.2 Explain the fundamental concepts and best practices related to authentication, authorization and access control 5.3 Implement appropriate security controls when performing account management 6.0 Cryptography 6.1 Summarize general cryptography concepts 6.2 Use and apply appropriate cryptographic tools and products 6.3 Explain the core concepts of public key infrastructure 6.4 Implement PKI, certificate management and associated components |