Certified Web Application Security Expert Level 2
COURSE DESCRIPTION
Web applications have been popular than ever. Although these applications have made many processes swift and easier, the quantity and importance of data entrusted to these web applications is also growing. The security specialists need to learn and secure the applications from any unwarranted attacks. Conventional network defenses, such as firewalls have become insufficient to secure web applications today and need skilled experts who can identify, analyze and rectify vulnerabilities in a web application security. The groundbreaking classroom sessions at Shiv-India Ghana for the Diploma in Web Application Security Course encourage students to strategies the plan of defense and come up with new approaches to handle a security issue.
Course Contents | ||||
Module | Topic | |||
Module 1: | Network Topology | |||
Module 2: | Open Systems Interconnectivity Model | |||
Module 3: | TCP/IP In-depth | |||
Module 4: | WAP, NAT, DNS and ICMP | |||
Module 5: | Internet Routing | |||
Module 6: | Advanced Port Scanning | |||
Module 7: | Sniffing Attacks | |||
Module 8: | Masquerading Attacks | |||
Module 9: | Advanced DOS and DDOS | |||
Module 10: | Session Hijacking Attacks | |||
Module 11: | Network Operations Center – Security | |||
Module 12: | Network Traffic Analysis | |||
Module 13: | Network Vulnerability Assessment | |||
Module 14: | Network Penetration Testing | |||
Module 15: | Intrusion Detection System | |||
Module 16: | Snort 101 | |||
Module 17: | OSSEC 102 | |||
Module 18: | Intrusion Prevention System | |||
Module 19: | Firewalls (Installation, Configuration and Usage) | |||
Module 20: | OS Hardening for Networks – Linux and Windows | |||
Module 21: | Cryptography – Introduction | |||
Module 22: | Symmetric Key Encryption | |||
Module 23: | Asymmetric Key Encryption | |||
Module 24: | Hash functions | |||
Module 25: | Trust Models | |||
Module 26: | VLAN – Security | |||
Module 27: | VPN – Security | |||
Module 28: | Wireless Networks – Introduction | |||
Module 29: | Radio Frequency Essentials | |||
Module 30: | Wireless Security – Basics | |||
Module 31: | Wireless Threats | |||
Module 32: | Attacking Wireless Hotspot and Security | |||
Module 33: | WEP Security | |||
Module 34: | WPA/WPA2 Security | |||
Module 35: | Secure Wireless Infrastructure Deployment | |||
Module 36: | DNS Tunneling | |||
Module 37: | Network Forensic Methodology | |||
Module 38: | Network Evidence Acquisition | |||
Module 39: | OS Logs and Splunk | |||
Module 40: | Summary |