UTL Technologies Ltd

Certificate Course in Network Security

UTL Technologies Ltd
In Bangalore (India)

Prefer to call the centre directly?

Important information

Typology Short course
Level Intermediate
Location Bangalore (India)
Class hours 6h
Duration 10 Weeks
  • Short course
  • Intermediate
  • Bangalore (India)
  • 6h
  • Duration:
    10 Weeks

with Vulnerabilities & Threats all over, this course aims at preparing participants to secure their Computer Networks in various environments like Microsoft, Linux and Cisco

Important information

Government funding available

Facilities (1)
Where and when
Starts Location
On request
560086, Karnataka, India
See map
Starts On request
560086, Karnataka, India
See map

To take into account

· What are the objectives of this course?

with Vulnerabilities & Threats all over, this course aims at preparing participants to secure their Computer Networks in various environments like Microsoft, Linux and Cisco

· Who is it intended for?

This course is designed for individuals expected to have some hands-on experience with Windows Server, Windows based networking, Active Directory, Anti-Malware products, firewalls, network topologies and devices, and network ports

· Requirements

Graduates / Engineers / Diploma holders with basic Knowledge of Hardware and networking application used

· What happens after requesting information?

Your request will be reverted in 24hrs. You may get in touch with us thru mail Vishwas@utltechnologies.com or thru what's app +91 99029 66833

Questions & Answers

Ask a question and other users will answer you

What you'll learn on the course

Network security
Network Training

Teachers and trainers (2)

Ajay Rao
Ajay Rao
Technical Head - Networking

Sudarshan Manay
Sudarshan Manay
Technical Consultant - Networking

Course programme

Network Essentials: Networking Essentials, LAN, WAN, Protocols, ISO Model, IP Addressing, Internet, Intranet, Network Cables etc.,

Fundamental Of IT Security:

Introduction to Ethical Hacking, Ethics and Legality, Foot printing and Social Engineering, Scanning and Enumeration,System Hacking,Trojans, Backdoors, Virus and Worms,Sniffers,Denial of Services and Session Hijacking,Hacking Web Servers, Web Application Vulnerabilities,Wireless Hacking,Physical Security,Linux Hacking,Cryptography,Penetration Testing Methodologies with Kali Linux

Windows 2012 - Security:

Overview of AD, Access Control, Exploring DNS, AD object, Group Policy,Configuration of AD CS, Overview of PKI Deploying a CA Hierarchy,Configuration of AD RMS, Configuration of VPN Access, Routing and Remote Access Configuration of IPSec,Designing Network Security, Identifying threats to Network Security and Clustering.

Forefront Threat Management Gateway (TMG):

Installing and Maintaining TMG Server Enabling Access to Internet Resources. Configuring TMG as a firewall, Configuring Access to Advanced Application & Web Filtering,Configuring VPN Access & Remote Clients & Networks, Implementing Caching to Browsing performance monitoring TMG, Site-to Site VPN,Implementing TMG Enterprise Edition: Back to Back firewall, Intranet, extranet and DMZ

Linux Security:

Overview of Linux, Creating and Managing Users and Groups,

Package Management, Managing and Creating Partition Table, Introduction to LVM and RAID, Net filter, Iproute2 and Traffic Control Iptables, Layer 7 Filtering,NAT and Packet Mangling with iptables, SNAT, DNAT, PAT. SQUID,

Cisco Security:

Securing the Router for Administrative Access, Securing Administrative Access using AAA and RADIUS. Security Policy Development and Implementation,Using the CLI and SDM, VLAN, Securing Layer 2 Switches,Configuring a Site-to-Site VPN using Cisco IOS and SDM, Configuring a Remote Access VPN Server and Client.

Compare to choose better:
See all