Network & Security Training Course

Successful completion of Network & Security online training from BIT and subsequently getting certified by CompTIA will help you gain skills required by employers all over the world to manage and maintain security of their information systems.

  • 40000
  • 45000
  • Course Includes
  • Live Class Practical Oriented Training
  • 120+ Hrs Instructor LED Training
  • 70 + Hrs Practical Exercise
  • 35 + Hrs Project Work & Assignment
  • Timely Doubt Resolution
  • Dedicated Student Success Mentor
  • Certification & Job Assistance
  • Free Access to Workshop & Webinar
  • No Cost EMI Option


Have Query ?

What you will learn

  • Identify characteristics of a variety of network protocols. Identify the components of a LAN implementation.
  • Identify the components of a WAN implementation. Identify major issues and technologies in network security.
  • Identify the components of a remote network implementation. Identify major issues and technologies in disaster recovery.
  • Detect various types of compromise and have an understanding of penetration testing and vulnerability scanning concepts
  • Install, configure, and deploy network components while assessing and troubleshooting issues to support organizational s...
  • Implement secure network architecture concepts and systems design
  • Install and configure identity and access services, as well as management controls
  • Implement and summarize risk management best practices and the business impact
  • Install and configure wireless security settings and implement public key infrastructure

Requirements

  • There are no specific prerequisites to take up this certification.

Description

|| About Network & Security Training Course

Network & Security Online Training Course is design to clear Network security Concepts.  Network Security is needed to prevent and monitor unauthorized access, modification, misuse, or denial of a computer network and network-accessible resources. As the internet evolves and computer networks become bigger and bigger, network security has emerged as one of the most important factors for companies to consider. BIT offer Certified Network Defense, Advanced Network Défense, Cisco Network Security Audit, Network Security Expert and many more to prevent unauthorized access, data theft, network misuse, device and data modification.

 

CompTIA’s Network+ certification is an entry level vendor neutral certification for aspiring system and network administrators. The Network+ course provides basic training in managing, maintaining, troubleshooting, installing and configuring a network infrastructure. Nine months of experience in network support or administration along with a CompTIA A+ certification is recommended before the Network+ course. Network+ certification is also a step towards attaining higher level vendor specific certifications such as Microsoft (MCSE, MCITP), Cisco (CCNA, CCNP) and Linux (Linux+, RHCE).

 

CompTIA’s Security+ training expands the coverage of cybersecurity threats, risk management, and IoT threats. This course prepares exam candidates for the first domain of the exam, Threats, Attacks, and Vulnerabilities. By learning about malware, networking and application security exploitations, and social engineering, participants will be prepared to answer questions from the exam and strengthen your own organization's systems and defenses.

Exam: SY0-601 CompTIA Security+

Exam: N10-007 CompTIA N+

Course Content

Lecture 1: Ports and protocols

·      Protocols and ports

·      Protocol types

·      Connection-oriented vs. connectionless

·      Practical Exercise

Lecture 2: Devices, applications, protocols & services

·      Layer 1- Physical

·      Layer 2- Data link

·      Layer 3- Network

·      Layer 4- Transport

·      Layer 5- Session

·      Layer 6- Presentation

·      Layer 7- Application

·      Practical Exercise   

Lecture 3: Routing and switching

·      Properties of network traffic

·      Segmentation and interface properties

·      Routing

·      1Pv6 concepts

·      Performance concepts

·      NAT/PAT

·      Port forwarding

·      Access control list

·      Distributed switching

·      Packet-switched vs. circuit

·      Switched network

·      Software-defined networking

·      Practical Exercise

Lecture 4: Appropriate IP addressing components

·      Private  vs. public

·      Loop back and reserved

·      Default  gateway

·      Virtual  IP

·      Subnet  mask

·      Subnetting

·      Address assignments

·      Practical Exercise

Lecture 5: Network topologies, types and technologies

·      Wired  topologies

·      Types 

·      Technologies  that  facilitate the Internet of Things (loT)

·      Wireless  topologies

·      Practical Exercise 

Lecture 6: Appropriate wireless technologies & configurations

·      802.11 standards

·      Cellula

·      Frequencies

·      Speed and distance  requirements

·      Channel bandwidth

·      Channel bonding

·      MIMO/MU-MIMO

·      Unidirectional/omnidirectional

·      Site surveys

·      Practical Exercise                

Lecture 7: Cloud concepts

·      Types of services

·      Cloud delivery models

·      Connectivity methods

·      Security implications/considerations

·      Relationship between  local and cloud resources

·      Practical Exercise                   

Lecture 8: Functions of network services

·      DNS  service

·      DHCP  service

·      NTP

·      IPAM

·      Practical Exercise 

Lecture 9: Deploy the appropriate cabling solution

·      Media types

·      Plenum vs. PVC

·      Connector  types

·      Transceivers

·      Termination   points

·      Copper cable standards

·      Copper termination  standards

·      Ethernet  deployment standards

·      Practical Exercise                

Lecture 10: Appropriate placement of networking devices

·      Firewall

·      Router

·      Switch

·      Hub   

·      Bridge

·      Modems

·      Wireless  access point

·      Media converter

·      Wireless  range extender

·      VoIP endpoint

·      Practical Exercise          

Lecture 11: Advanced Networking devices

·      Multilayer switch

·      Proxy server

·      NGFW/Layer 7 firewall

·      Wireless  controller

·      VPN concentrator

·      VoIP PBX

·      Load balancer

·      IDS/IPS         

·      AANRADIUS server

·      UTM appliance          

·      VoIP gateway

·      Content  filter

·      Practical Exercise           

Lecture 12: Virtualization & network storage technologies

·      Virtual  networking components

·      Network  storage  types

·      Connection  type

·      Jumbo frame

·      Practical Exercise              

Lecture 13: WAN technologies

·      Service type

·      Transmission  mediums

·      Characteristics of service

·      Termination

·      Practical Exercise

Lecture 14: Documentation & diagrams

·      Diagram symbols

·      Standard operating procedures/work instructions

·      Logical vs. physical diagrams

·      Rack diagrams

·      Change management documentation

·      Wiring and port locations

·      IDF/MDF documentation

·      Labelling

·      Network configuration and performance baselines

·      Inventory management

·      Practical Exercise                      

Lecture 15: Business continuity & disaster recovery concepts

·      Availability concepts

·      Recovery

·      MTBF

·      SLA  requirements

·      Practical Exercise                 

Lecture 16: Scanning, monitoring and patching

·      Processes

·      Event management

·      Metrics

·      SNMP monitors

·      Practical Exercise                      

Lecture 17: Remote access methods

·      VPN

·      RDP

·      SSH

·      VNC

·      Telnet

·      HTTPS/management  URL

·      Remote tile access

·      Out-of-band  management

·      Practical Exercise                 

Lecture 18: Identify policies and best practices

·      Privileged  user agreement

·      Password  policy

·      On-boarding/off-boarding procedures

·      Licensing  restrictions

·      International  export  controls

·      Data loss prevention

·      Remote access policies

·      Incident response  policies

·      BYOD

·      AUP

·      NDA

·      System life cycle

·      Safety procedures  and policies

·      Practical Exercise

Lecture 19: Physical security devices

·      Detection

·      Prevention

·      Practical Exercise                  

Lecture 20: Authentication and access controls

·      Authorization, authentication and accounting

·      Multi factor authentication

·      Access control

·      Practical Exercise            

Lecture 21: Secure a basic wireless network

·      WPA

·      WPA2

·      TKIP-RC4

·      CCMP-AES

·      Authentication  and authorization

·      Geofencing 

·      Practical Exercise              

Lecture 22: Summarize common networking attacks

·      Dos

·      Rogue access point

·      Spoofing

·      Evil twin

·      Deauthentication

·      War-driving

·      Brute force

·      Phishing

·      VLAN hopping

·      Social engineering

·      Ransomware

·      Man-in-the-middle

·      Insider  threat

·      DNS poisoning

·      Exploits  vs. vulnerabilities

·      Logic bomb

·      ARP poisoning   

·      Practical Exercise                   

Lecture 23: Network device hardening

·      Changing  default  credentials

·      Avoiding  common  passwords

·      Upgrading  firmware

·      Patching  and updates

·      File hashing

·      Disabling  unnecessary  services

·      Using secure protocols

·      Generating  new keys

·      Disabling  unused ports

·      Practical Exercise                      

Lecture 24: Common mitigation techniques

·      Signature  management

·      Device hardening

·      Change native  VLAN

·      Switch  port  protection

·      Network  segmentation

·      Privileged  user account

·      File integrity  monitoring

·      Role separation

·      Restricting  access via ACLs

·      Honeypot/honeynet

·      Penetration   testing

·      Practical Exercise

Lecture 25: Network troubleshooting methodology

·      Identify the problem

·      Establish a theory of probable cause

·      Test the theory to determine the cause

·      Document findings, actions, and outcomes

·      Establish a plan of action

·      Implement the solution or escalate as necessary

·      Verify full system functionality

·      Practical Exercise      

Lecture 26: Appropriate tool

·      Hardware tools

·      Software tools

·      Practical Exercise           

Lecture 27: Common wired connectivity & performance issues

·      Attenuation

·      Latency

·      Jitter

·      Crosstalk

·      EMI

·      Open/short

·      Incorrect  pin-out

·      Incorrect  cable type

·      Bad port

·      Transceiver  mismatch

·      TX/RX reverse

·      Duplex/speed   mismatch

·      Damaged cables

·      Bent pins

·      Bottlenecks

·      VLAN mismatch

·      Network  connection   LED status  indicators

·      Practical Exercise      

Lecture 28: Common wireless connectivity & performance issues

·      Reflection

·      Refraction

·      Absorption

·      Latency         

·      Jitter

·      Attenuation

·      Incorrect antenna type

·      Interference

·      Incorrect antenna placement

·      Channel overlap

·      Overcapacity

·      Distance limitations

·      Frequency mismatch

·      Wrong SSID

·      Wrong passphrase

·      Security type mismatch

·      Power levels

·      Signal-to-noise ratio

·      Practical Exercise

Lecture 29: Common network service issues

·      Names not resolving

·      Incorrect gateway

·      Incorrect netmask

·      Duplicate IP addresses

·      Duplicate MAC addresses

·      Expired  IP address

·      Rogue DHCP server

·      Untrusted SSL certificate

·      Incorrect  time

·      Exhausted  DHCP scope

·      Blocked TCP/UDP ports

·      Incorrect host-based firewall settings

·      Incorrect ACL settings

·      Unresponsive service

·      Hardware failure

·      Practical Exercise        

Lecture 30: Social engineering techniques

·      Phishing

·      Smishing

·      Vishing

·      Spam

·      Spam over Internet messaging (SPIM)

·      Spear phishing

·      Dumpster diving

·      Shoulder surfing

·      Pharming

·      Tailgating

·      Eliciting information

·      Whaling

·      Prepending

·      Identity fraud

·      Invoice scams

·      Credential harvesting

·      Reconnaissance

·      Hoax

·      Impersonation

·      Watering hole attack

·      Typo squatting

·      Pretexting

·      Influence campaigns

·      Principles (reasons for effectiveness)

·      Practical Exercise

Lecture 31: Type of attack

·      Malware    

·      Password attacks   

·      Adversarial artificial intelligence (AI)

·      Physical attacks

·      Supply-chain attacks

·      Cloud-based vs. on-premises attacks

·      Cryptographic attacks

·      Practical Exercise        

Lecture 32: Potential indicators associated with application attacks

·      Privilege escalation

·      Cross-site scripting

·      Injections

·      Pointer/object dereference

·      Directory traversal

·      Buffer overflows

·      Race conditions

·      Error handling

·      Improper input handling

·      Replay attack

·      Integer overflow

·      Request forgeries

·      Application programming interface (API) attacks

·      Resource exhaustion

·      Memory leak

·      Secure sockets layer (SSL) stripping

·      Driver manipulation

·      Pass the hash

·      Practical Exercise        

Lecture 33: Potential indicators associated with network attacks

·      Wireless                 

·      Man-in-the-browser

·      Man-in-the-middle

·      Layer 2 attacks      

·      Distributed denial-of-service (DDoS)

·      Malicious code or script execution

·      Domain name system (DNS)

·      Practical Exercise

Lecture 34: Threat actors, vectors & intelligence sources

·      Actors and threats

·      Attributes of actors

·      Vectors

·      Threat intelligence sources

·      Research sources

·      Practical Exercise

Lecture 35: Security concerns associated with types of vulnerabilities

·      Cloud-based vs. on-premises vulnerabilities

·      Zero-day

·      Weak configurations

·      Third-party risks

·      Improper or weak patch management

·      Legacy platforms

·      Impacts

·      Practical Exercise        

Lecture 36: Techniques used in security assessments

·      Threat hunting

·      Vulnerability scans

·      Syslog/Security information and event management (SIEM)

·      Security orchestration, automation, and response (SOAR)

·      Practical Exercise

Lecture 37: Techniques used in penetration testing

·      Penetration testing

·      Passive and active reconnaissance

·      Exercise types

·      Practical Exercise

Lecture 38: Security concepts in an enterprise environment

·      Configuration management           

·      Hardware security module (HSM)

·      Deception and disruption

·      Data sovereignty

·      Data protection

·      Geographical considerations

·      Cloud access security broker (CASB)

·      Response and recovery controls

·      Secure Sockets Layer (SSL)

·      Transport Layer Security (TLS) inspection

·      Hashing

·      API considerations

·      Site resiliency

·      Practical Exercise

Lecture 39: Virtualization & cloud computing concepts

·      Cloud models

·      Cloud service providers

·      Managed service provider (MSP)

·      Managed security service provider (MSSP)

·      On-premises vs. off-premises

·      Fog computing

·      Edge computing

·      Thin client

·      Containers

·      Microservices/API

·      Infrastructure as code

·      Serverless architecture

·      Services integration

·      Resource policies

·      Transit gateway

·      Virtualization

·      Practical Exercise

Lecture 40: Secure application development, deployment, & automation concepts

·      Environment

·      Provisioning and deprovisioning

·      Integrity measurement

·      Secure coding techniques

·      Open Web Application Security Project (OWASP)

·      Software diversity

·      Automation/scripting

·      Elasticity

·      Scalability

·      Version control

·      Practical Exercise

Lecture 41:Authentication & authorization design concepts

·      Authentication methods    

·      Biometrics 

·      Multifactor authentication (MFA) factors and attributes

·      Authentication, authorization, and accounting (AAA)

·      Cloud vs. on-premises requirements

·      Practical Exercise        

Lecture 42: Implement cyber security resilience

·      Redundancy          

·      Replication

·      On-premises vs. cloud

·      Backup types

·      Non-persistence

·      High availability

·      Restoration order

·      Diversity

·      Practical Exercise

Lecture 43: Security implications of embedded & specialized systems

·      Embedded systems

·      Supervisory control & data acquisition(SCADA)

·      Industrial control system (ICS)

·      Internet of Things (IoT)

·      Specialized

·      Voice over IP (VoIP)

·      Heating, ventilation, air conditioning (HVAC)

·      Drones/AVs

·      Multifunction printer (MFP)

·      Real-time operating system (RTOS)

·      Surveillance systems

·      System on chip (SoC)

·      Communication considerations

·      Constraints

·      Practical Exercise

Lecture 44: Physical security controls

·      Bollards/barricades

·      Mantraps

·      Badges

·      Alarms

·      Signage

·      Cameras

·      Closed-circuit television (CCTV)

·      Industrial camouflage

·      Personnel

·      Locks

·      USB data blocker

·      Lighting

·      Fencing

·      Fire suppression

·      Sensors

·      Drones/UAV

·      Visitor logs

·      Faraday cages

·      Air gap

·      Demilitarized zone (DMZ)

·      Protected cable distribution

·      Secure areas

·      Secure data destruction

·      Practical Exercise        

Lecture 45: Basics of cryptographic concepts

·      Digital signatures

·      Key length

·      Key stretching

·      Salting

·      Hashing

·      Key exchange

·      Elliptic-curve cryptography

·      Perfect forward secrecy

·      Quantum

·      Post-quantum

·      Ephemeral

·      Modes of operation

·      Blockchain

·      Cipher suites

·      Symmetric vs. asymmetric

·      Lightweight cryptography

·      Steganography

·      Homomorphic encryption

·      Common use cases

·      Limitations

·      Practical Exercise

Lecture 46: Implement secure protocols

·      Protocols

·      Use cases

·      Practical Exercise

Lecture 47: Implement host or application security solutions

·      Endpoint protection

·      Boot integrity

·      Database

·      Application security

·      Hardening

·      Self-encrypting drive (SED)/ full-disk encryption (FDE)

·      Hardware root of trust

·      Trusted Platform Module (TPM)

·      Sandboxing

·      Practical Exercise

Lecture 48: Implement secure network designs

·      Load balancing      

·      Out-of-band management

·      Network segmentation

·      Virtual private network (VPN)

·      DNS

·      Network access control (NAC)

·      Port security

·      Network appliances

·      Access control list (ACL)

·      Route security

·      Quality of service (QoS)

·      Implications of IPv6

·      Port spanning/port mirroring

·      Monitoring services

·      File integrity monitors

·      Practical Exercise        

Lecture 49: Wireless security settings

·      Cryptographic protocols

·      Authentication protocols

·      Methods

·      Installation considerations

·      Practical Exercise

Lecture 50: Secure mobile solutions

·      Connection methods and receivers

·      Mobile device management (MDM)

·      Mobile devices

·      Enforcement and monitoring

·      Deployment models

·      Practical Exercise

Lecture 51: Cyber security solutions to the cloud

·      Cloud security controls

·      Solutions

·      Cloud native controls vs. third-party solutions

·      Practical Exercise        

Lecture 52: Identity & account management controls

·      Identity

·      Account types

·      Account policies

·      Practical Exercise

Lecture 53: Authentication and authorization solutions

·      Authentication management

·      Authentication

·      Access control schemes

·      Practical Exercise

Lecture 54: Public key infrastructure

·      Public key infrastructure (PKI)     

·      Types of certificates

·      Certificate formats

·      Concepts

·      Practical Exercise

Lecture 55: Appropriate tool to assess organizational security

·      Network reconnaissance and discovery

·      File manipulation

·      Shell and script environments

·      Packet capture and replay

·      Forensics

·      Exploitation frameworks

·      Password crackers

·      Data sanitization

·      Practical Exercise

Lecture 56: Policies, processes, & procedures for incident response

·      Incident response plans

·      Incident response process

·      Exercises   

·      Stakeholder management

·      Attack frameworks

·      Communication plan

·      Disaster recovery plan

·      Business continuity plan

·      Continuity of operations planning (COOP)

·      Incident response team

·      Retention policies

·      Practical Exercise

Lecture 57: Appropriate data sources to support an investigation

·      Vulnerability scan output

·      SIEM dashboards

·      Log files

·      syslog/rsyslog/syslog-ng

·      journalctl

·      nxlog

·      Retention

·      Bandwidth monitors

·      Metadata

·      Netflow/sflow

·      Protocol analyzer output

·      Practical Exercise

Lecture 58: Mitigation techniques or controls

·      Reconfigure endpoint security solutions

·      Isolation

·      Containment

·      Segmentation

·      SOAR

·      Practical Exercise

Lecture 59: Key aspects of digital forensics

·      Documentation/evidence

·      Acquisition

·      On-premises vs. cloud

·      Integrity

·      Preservation

·      E-discovery

·      Data recovery

·      Non-repudiation

·      Strategic intelligence/counter intelligence

·      Practical Exercise

Lecture 60: Types of controls

·      Category    

·      Control type

·      Practical Exercise

Lecture 61: Applicable regulations, standards, or framework

·      Regulations, standards, and legislation

·      Key frameworks

·      Benchmarks /secure configuration guides

·      Practical Exercise

Lecture 62: Importance of policies to organizational security

·      Personnel

·      Diversity of training techniques

·      Third-party risk management

·      Data

·      Credential policies

·      Organizational policies

·      Practical Exercise

Lecture 63: Risk management processes & concepts

·      Risk types

·      Risk management strategies

·      Risk analysis

·      Disasters

·      Business impact analysis

·      Practical Exercise

Lecture 64: Privacy & sensitive data concepts

·      Organizational consequences of privacy breaches

·      Notifications of breaches

·      Data types

·      Privacy enhancing technologies

·      Roles and responsibilities

·      Information life cycle

·      Impact assessment

·      Terms of agreement

·      Privacy notice

·      Practical Exercise

Fees

Offline Training @ Vadodara

  • Classroom Based Training
  • Practical Based Training
  • No Cost EMI Option
50000 45000

Online Training preferred

  • Live Virtual Classroom Training
  • 1:1 Doubt Resolution Sessions
  • Recorded Live Lectures*
  • Flexible Schedule
45000 40000

Corporate Training

  • Customized Learning
  • Onsite Based Corporate Training
  • Online Corporate Training
  • Certified Corporate Training

Certification

  • Upon the completion of the Classroom training, you will have an Offline exam that will help you prepare for the Professional certification exam and score top marks. The BIT Certification is awarded upon successfully completing an offline exam after reviewed by experts
  • Upon the completion of the training, you will have an online exam that will help you prepare for the Professional certification exam and score top marks. BIT Certification is awarded upon successfully completing an online exam after reviewed by experts.
  • This course is designed to clear the following Network & Security Professional Program: Exam: SY0-601 CompTIA Security+ and Exam: N10-007 CompTIA N+