Main Menu

Assign modules on offcanvas module position to make them visible in the sidebar.

Our school

English French German Italian Portuguese Russian Spanish

CERTIFIED INFORMATION SECURITY EXPERT LEVEL 2: Network Security
CISE Level 2: NS

This training Program aims at imparting skills required to secure a Network from Internal and External Threats by understanding and analyzing the Vulnerabilities which exist in a Network. We cover building an appropriate Network Security Infrastructure required to Monitor and Secure a Network, wired or wireless by using the correct Hardware, Software and Penetration Testing – Ethical Hacking Infrastructure. We will be practically understanding various network based attacks, Intrusion Detection Systems, Intrusion Prevention Systems, Firewalls, Virtual LANs, Virtual Private Networks, Network Encryption, Wireless Network Security, DNS Tunneling and Network Forensics.
Training Duration: 60 Hours
Pre-requisite: CISE Level 1.

Chapter 1 – Network Topology
Chapter 2 – Open Systems Interconnectivity Model
Chapter 3 – TCP/IP In-depth
Chapter 4 – WAP, NAT, DNS and ICMP
Chapter 5 – Internet Routing
Chapter 6 – Advanced Port Scanning
Chapter 7 – Sniffing Attacks
Chapter 8 – Masquerading Attacks
Chapter 9 – Advanced DOS and DDOS
Chapter 10 – Session Hijacking Attacks
Chapter 11 – Network Operations Center – Security
Chapter 12 – Network Traffic Analysis
Chapter 13 – Network Vulnerability Assessment
Chapter 14 – Network Penetration Testing
Chapter 15 – Intrusion Detection System
Chapter 16 – Snort 101
Chapter 17 – OSSEC 102
Chapter 18 – Intrusion Prevention System
Chapter 19 – Firewalls (Installation, Configuration and Usage)
Chapter 20 – OS Hardening for Networks – Linux and Windows
Chapter 21 – Cryptography – Introduction
Chapter 22 – Symmetric Key Encryption
Chapter 23 – Asymmetric Key Encryption
Chapter 24 – Hash functions
Chapter 25 – Trust models
Chapter 26 – VLAN – Security
Chapter 27 – VPN – Security
Chapter 28 – Wireless Networks – Introduction
Chapter 29 – Radio Frequency Essentials
Chapter 30 – Wireless Security – Basics
Chapter 31 – Wireless Threats
Chapter 32 – Attacking Wireless Hotspot and Security
Chapter 33 – WEP Security
Chapter 34 – WPA/WPA2 Security
Chapter 35 – Secure Wireless Infrastructure Deployment
Chapter 36 – DNS Tunneling
Chapter 37 – Network Forensic Methodology
Chapter 38 – Network Evidence Acquisition
Chapter 39 – OS Logs and Splunk
Chapter 40 – Summary