Email: info@rkwebconsulting.com | Phone Number: +91-7206375331

Network Security

shape
shape
shape
shape
shape
shape
shape
shape

This training Program aims at imparting skills required to secure a Network from Internal and External Threats by understanding and analyzing the Vulnerabilities which exist in a Network. We cover building an appropriate Network Security Infrastructure required to Monitor and Secure a Network, wired or wireless by using the correct Hardware, Software, and Penetration Testing – Ethical Hacking Infrastructure. We will be practically understanding various network-based attacks, Intrusion Detection Systems, Intrusion Prevention Systems, Firewalls, Virtual LANs, Virtual Private Networks, Network Encryption, Wireless Network Security, DNS Tunneling and Network Forensics.

Computer networks that are involved in regular transactions and communication within the government, individuals, or business require security. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

Network Security Course Content

  • Chapter 1 – Network Topology
    Chapter 2 – Open Systems Interconnectivity Model
    Chapter 3 – TCP/IP In-depth
    Chapter 4 – WAP, NAT, DNS and ICMP
    Chapter 5 – Internet Routing
    Chapter 6 – Advanced Port Scanning
    Chapter 7 – Sniffing Attacks
    Chapter 8 – Masquerading Attacks
    Chapter 9 – Advanced DOS and DDOS
    Chapter 10 – Session Hijacking Attacks
    Chapter 11 – Network Operations Center -Security
    Chapter 12 – Network Traffic Analysis
    Chapter 13 – Network Vulnerability Assessment
    Chapter 14 – Network Penetration Testing
    Chapter 15 – Intrusion Detection System
    Chapter 16 – Solar winds
    Chapter 17 – Glasswire
    Chapter 18 – Intrusion Prevention System
    Chapter 19 – Firewalls (Installation,Configuration and Usage)
    Chapter 20 – OS Hardening for Networks -Windows
    Chapter 21 – Cryptography – Introduction
    Chapter 22 – Symmetric Key Encryption
    Chapter 23 – Asymmetric Key Encryption
    Chapter 24 – Hash functions
    Chapter 25 – Trust models
    Chapter 26 – VLAN – Security
    Chapter 27 – VPN – Security
    Chapter 28 – Wireless Networks – Introduction
    Chapter 29 – Radio Frequency Essentials
    Chapter 30 – Wireless Security – Basics
    Chapter 31 – Wireless Threats
    Chapter 32 – Attacking Wireless Hotspot andSecurity
    Chapter 33 – WEP Security
    Chapter 34 – WPA/WPA2 Security
    Chapter 35 – Secure Wireless Infrastructure Deployment
    Chapter 36 – DNS Tunneling
    DURATION: 90HRs

Course Content

    • Chapter 1 -Introduction to Hacking
      • What is hacking
      • What are the types of hacker
      • What is VAPT
      • Introduction to OWASP
    • Chapter 2 -Networking
      • What is IP
      • Types of Ip
      • IPv4 & IPv6
      • Topology
      • Types of topology
    • Chapter 3- FootPrinting
      • What is Footprinting
      • Types of Footprinting
      • Steps of Footprinting
      • Practical OnFootprinting
      • Counter Measure
    • Chapter 4 – Scanning
      • What is scanning
      • Tools for scanning
      • OWASP zap
      • Namp
      • counter measure
    • Chapter 5 – Google Hacking
      • introduction to Google.
      • Google Dorks
      • Robots File
      • counter measure
    • Chapter 6 – Malware / Trojan
      • What is malware
      • Batch file virus
      • Creating trojan virus
      • Darkcomet
    • Chapter 7 – Metaspoilt
      • msfconsole
      • msfvenom
      • use of exploit
      • counter measure
    • Chapter 8 – Android Hacking & Security
      • creating backdoor
      • using Metasploit
      • creating malacious application
      • Exploiting Android
    • Chapter 9 – Denial of service
      • Tools
      • counter measure
    • Chapter 10 – Password Cracker
      • PDF password Brute Force
      • Password Viewer
      • Recovering Lost Password
      • Sniffers
    • Chapter 11 – Phishing / Social engineering
      • what is Phishing
      • Performing Phishing
      • Facebook hacking
      • social engineering
      • Counter measure
    • Chapter 12 – XSS Attack
      • Introduction
      • Types of XSS
      • Counter Measure
    • Chapter 13 – SQL Injection
      • What is SQL
      • Introduction to SQL Injection
      • Hacking Database
      • Finding Admin panel
      • Breaking admin panel
      • Counter Measure
    • Chapter 14 – E-mail Security
      • Introduction to Email security
      • How Email works
      • Hacking Mail clients
      • Fake mail
      • How to check Fake mail
      • Counter Measure
    • Chapter 15 – Cryptography & Stegnography
      • Introduction
      • Practical and tools
      • Counter Measure
    • Chapter 16 – WiFi Hacking
      • Wifi Types
      • Hacking WEP/WPA2
      • Tools to hack WiFi
      • Counter Measure
    • Chapter 17 – Cyber Forensics
      • Introduction
      • Data Recovery
      • website logs
    • Chapter 18 – Report writing & earning money
      • VAPT report
      • Bug Crowd
      • Hacker one
      • Google Ad sense
      • Affiliate marketing

    DURATION:50 HRs 

Book Your Demo Class.

Contact Details