(+91)-858-7827556
info@cyber-hunt.com
About Our Company
CYBER-HUNT SECURITY GROUP OF TECHNOLOGY (P) LTD

NETWORK & NETWORK SECURITY

Network Security

Network Security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users and programs to perform their permitted critical functions within a secure environment.

Course Focus

A Cyber-Hunt course aimed at providing the most comprehensive knowledge and skills in the Network Security providing an opportunity to equip the Network System Administrators & Information Security Officers to understand the security concerns, vulnerabilities, attacks and to plan and implement the desired Cyber-Hunt solutions.

Course Objective

In today’s networked world, most of the organizations and enterprises depend on different kinds of Information Technology solutions, say e-commerce, e-governance, e-learning, e-banking etc. All communications must be secured and under control since the information stored and conveyed is ultimately an invaluable resource of the business. Securing vital resources and information in the network is the most challenging feat for system enterprise. The growing number of the computer Network (internet/intranet) attacks and sophistication in attack technologies has made this task still more complicated. The course content is developed with the support of Department of Information Technology, Ministry of Communications and IT, Government of India. Therefore the need of the hour is to update the knowledge of the personnel manning networks and systems on the network security issues and solutions.

The time of Networks and S systems professionals working in an organization is very valuable and hence it is difficult to spare their time for training away from the organizations. E-Learning mode of offering of Cyber Security course is a humble effort to reduce cost and time to organization in training their officials.

Aims: To survey the principles and practice of network security. The emphasis of the course is on the underlying principles and techniques of network security with examples of how they are applied in practice.

Learning Outcomes:

At the end of the course, a student will have an understanding of: the themes and challenges of network security, the role of cryptography, the techniques for access control and intrusion detection, the current state of the art. The student will have developed a critical approach to the analysis of network security, and will be able to bring this approach to bear on future decisions regarding network security. Practical skills will include the implementation of a security protocol. Pre-requisites: Distributed Systems

Outline Syllabus:

Introduction: assets, threats, countermeasures; network security models, security functions: confidentiality, authentication, integrity, nonrepudiation, access control, availability, passive and active attacks, end-to-end vs link-to-link encryption.

Classical Cryptography: key ideas, steganography, codes, one-time pad, substitution and transposition ciphers, cryptanalysis, cryptographic strength.

Symmetric-Key cryptography: Feistel cipher; DES: basics, rounds, e-box, s-box, p-box, key box; Modes of Operation: ECB, CBC, CFB, OFB; Double DES, Triple DES, IDEA, RC5, AES, problems with symmetric key cryptography.

Public-Key cryptography: requirements, confidentiality, authentication, modular arithmetic, Diffie-Hellman key exchange, RSA, attacks against RSA, hybrid cryptosystems, Elliptical Curve, Quantum Cryptography.

Digital Signatures: characteristics, MAC's, one-way hash functions, signing and verification, birthday attack, public-key certificates, disavowed signatures, arbitrated digital signatures, chaffing & winnowing.

Mutual Authentication: basics, replay attacks, man-in-the-middle, interlock protocol, Andrew Secure RPC, Needham Schroeder, Wide-Mouth Frog, Neuman-Stubblebine, Woo-Lam.

BAN-Logic

Key Management: distribution, KDC, announcements and directories, public key certificates, X509 certification authorities, PGP web of trust, control vectors, key generation and destruction, key backup.

Intruders and Programmed Threats: host access, password systems and attacks, one-time passwords, token cards, biometrics, trapdoors, programmed threats: trapdoors, logic bombs, Trojan horses, viruses, worms, countermeasures, and intrusion-direction.

Firewalls: internet security policies, firewall design goals, firewall controls, TCP/IP, packet filtering routers, application-level gateways, circuit-level gateways, firewall architectures, VPNs.

Web Security: WWW, web servers, CGI, active content, Java applets, Java security model: sandbox, class loaders, byte code verification, security manager, Java attacks, bypassing Java, mobile code cryptography.

What Is Network Security and How Does It Protect You?

After asking What is network security?, you should ask, What are the threats to my network? Many network security threats today are spread over the Internet. The most common include:

  • • Viruses, worms, and Trojan horses
  • • Spyware and adware
  • • Zero-day attacks, also called zero-hour attacks
  • • Hacker attacks
  • • Denial of service attacks
  • • Data interception and theft
  • • Identity theft
How Does Network Security Work?

To understand What is network security?, it helps to understand that no single solution protects you from a variety of threats. You need multiple layers of security. If one fails, others still stand.

Network security is accomplished through hardware and software. The software must be constantly updated and managed to protect you from emerging threats.

A network security system usually consists of many components. Ideally, all components work together, which minimizes maintenance and improves security.

Network security components often include:

  • • Anti-virus and anti-spyware
  • • Firewall, to block unauthorized access to your network
  • • Intrusion prevention systems (IPS), to identify fast-spreading threats, such as zero-day or zero-hour attacks
  • • Virtual Private Networks (VPNs), to provide secure remote access
Course Designed for
  • • Network System
  • • Administrators
  • • Information Security Officers
  • • IT professionals
What are the Business Benefits of Network Security?

With network security in place, your company will experience many business benefits. Your company is protected against business disruption, which helps keep employees productive. Network security helps your company meet mandatory regulatory compliance. Because network security helps protect your customers' data, it reduces the risk of legal action from data theft. Ultimately, network security helps protect a business's reputation, which is one of its most important assets.

Student Will Learn How To-
  • • Analyze your exposure to security threats and protect your organization's systems and data
  • • Reduce your susceptibility to an attack by deploying firewalls and data encryption
  • • Assess alternative user and host authentication mechanisms
  • • Manage risks emanating from inside the organization and from the Internet
  • • Protect network users from hostile applications and viruses
Course Structure

This course is well structured with a three level hierarchy of units, modules & lessons. This course consists of units and modules. Each module in turn consists of number of lessons. The content is available in PDF form; power point presentation with speaker notes and voice over. It also has some video lectures delivered by experts on selected topics which are aimed at motivating the learner into the specific Cyber-Hunt topics. On-line-assessment is an attractive feature provided through on-Line quizzes and assignments.





© Copy rights 2013 CYBER-HUNT SECURITY GROUP OF TECHNOLOGY (P) LTD | All Rights reserved.