UTL Technologies Ltd

      Certificate Course in Network Security

      UTL Technologies Ltd
      In Bangalore (India)

      Prefer to call the centre directly?
      99029... More
      Want to speak to an Advisor about this course?

      Important information

      Typology Short course
      Level Intermediate
      Location Bangalore (India)
      Class hours 6h
      Duration 10 Weeks
      • Short course
      • Intermediate
      • Bangalore (India)
      • 6h
      • Duration:
        10 Weeks

      with Vulnerabilities & Threats all over, this course aims at preparing participants to secure their Computer Networks in various environments like Microsoft, Linux and Cisco

      Important information

      Government funding available

      Facilities (1)
      Where and when
      Starts Location
      On request
      560086, Karnataka, India
      See map
      Starts On request
      560086, Karnataka, India
      See map

      To take into account

      · What are the objectives of this course?

      with Vulnerabilities & Threats all over, this course aims at preparing participants to secure their Computer Networks in various environments like Microsoft, Linux and Cisco

      · Who is it intended for?

      This course is designed for individuals expected to have some hands-on experience with Windows Server, Windows based networking, Active Directory, Anti-Malware products, firewalls, network topologies and devices, and network ports

      · Requirements

      Graduates / Engineers / Diploma holders with basic Knowledge of Hardware and networking application used

      · What happens after requesting information?

      Your request will be reverted in 24hrs. You may get in touch with us thru mail Vishwas@utltechnologies.com or thru what's app +91 99029 66833

      Questions & Answers

      Ask a question and other users will answer you

      What you'll learn on the course

      Network security
      Network Training

      Teachers and trainers (2)

      Ajay Rao
      Ajay Rao
      Technical Head - Networking

      Sudarshan Manay
      Sudarshan Manay
      Technical Consultant - Networking

      Course programme

      Network Essentials: Networking Essentials, LAN, WAN, Protocols, ISO Model, IP Addressing, Internet, Intranet, Network Cables etc.,

      Fundamental Of IT Security:

      Introduction to Ethical Hacking, Ethics and Legality, Foot printing and Social Engineering, Scanning and Enumeration,System Hacking,Trojans, Backdoors, Virus and Worms,Sniffers,Denial of Services and Session Hijacking,Hacking Web Servers, Web Application Vulnerabilities,Wireless Hacking,Physical Security,Linux Hacking,Cryptography,Penetration Testing Methodologies with Kali Linux

      Windows 2012 - Security:

      Overview of AD, Access Control, Exploring DNS, AD object, Group Policy,Configuration of AD CS, Overview of PKI Deploying a CA Hierarchy,Configuration of AD RMS, Configuration of VPN Access, Routing and Remote Access Configuration of IPSec,Designing Network Security, Identifying threats to Network Security and Clustering.

      Forefront Threat Management Gateway (TMG):

      Installing and Maintaining TMG Server Enabling Access to Internet Resources. Configuring TMG as a firewall, Configuring Access to Advanced Application & Web Filtering,Configuring VPN Access & Remote Clients & Networks, Implementing Caching to Browsing performance monitoring TMG, Site-to Site VPN,Implementing TMG Enterprise Edition: Back to Back firewall, Intranet, extranet and DMZ

      Linux Security:

      Overview of Linux, Creating and Managing Users and Groups,

      Package Management, Managing and Creating Partition Table, Introduction to LVM and RAID, Net filter, Iproute2 and Traffic Control Iptables, Layer 7 Filtering,NAT and Packet Mangling with iptables, SNAT, DNAT, PAT. SQUID,

      Cisco Security:

      Securing the Router for Administrative Access, Securing Administrative Access using AAA and RADIUS. Security Policy Development and Implementation,Using the CLI and SDM, VLAN, Securing Layer 2 Switches,Configuring a Site-to-Site VPN using Cisco IOS and SDM, Configuring a Remote Access VPN Server and Client.

      Compare to choose better:
      See all