Intrusion Techniques
• Foot Printing
• Social Engineering
• Scanning
• Exploits
• System Hacking
• Web Server Hacking
• Router Hacking
• Sniffers
• Brute Force
• Trojans
• Key loggers
• Phishing
• Metasploits
• Wireless Hacking
| Checkpoint
• Installation of Checkpoint
• NAT
• Filtering (Security Policy Rules)
• Content Filtering
• Authentication and types
• Logging
• IPSEC VPN
• Backup and Restore
|
Countermeasures
• Patching the vulnerabilities
• Anti-Virus and Security Suites
• Comparison between KASPERSKY and other security suites
| NetASQ
• Installation of NetASQ
• Bridge Mode
• NAT
• Filtering Policy
• Content Filtering (Anti-virus, Anti-spam, URL filtering)
• Authentication
• Logging, Monitoring, Reporting
• IPSEC VPN
• SSL VPN
• Backup and Restore
• ASQ (IPS) and QoS
• SEISMO
|
Firewalls and UTM
Cisco PIX / ASA
• Types of Firewalls, Installation of PIX / ASA
• Bridge Mode
• Basic Configuration
• NAT
• Filter Rules
• URL filtering
• Authentication
• Logging and Reporting
• VLANs
• IPSEC VPN
• Fail-over
• Password Recovery
• Back-up, Restore and Upgrade
| Live Practicals and Case study
|
No comments:
Post a Comment