Annexure II
INDIVIDUAL COURSE DETAILS
A. Name of the Institute / UTL Technologies LimitedB. Name / Title of the Course / Certificate Course in Network Security
C. Proposed dates and duration
of the Course in Weeks / Months / Batch 02: From:11-09-2017 To 18-11-2017
Duration: 10 Weeks
D. Eligibility criteria for participants
I.Educational / Graduates / Engineers / Diploma Holders with prior Work Experience in Networking
II. Work Experience / Exposure to Networking Fundamentals and Network functions is desirable. 2 years of Prior experience in Networking will be an added advantage
III.Age Limit / Energetic professionals with a zeal and enthusiasm to learn and implement technologies
IV. Target group (Level of participants and target ministry/department etc. may be identified) / Officials from IT Departments of all Ministries, Govt. Departments, Banks, Telecom Companies, Universities, NGOs, Colleges, ICT oragnisations etc.
E. Aim, Objectives of the Course / Aim, Objective of the Course: With Vulnerabilities & Threats all over, this course aims at preparing participants to Secure & Manage Computer Networks in various platforms like Microsoft, Linux and Cisco. Participants are also exposed to various tools to conduct the security audit of the network.
This course also helps participants to take up international certification exams on security conducted by EC Council, Cisco, Linux and Microsoft
F. Course Contents
(please attached detailed course
profile) / Network Essentials:Networking Essentials, LAN, WAN, Protocols, ISO Model, IP Addressing, Internet, Intranet, Network Cables etc.,
Fundamental Of IT Security:
Introduction to Ethical Hacking, Ethics and Legality, Footprinting and Social Engineering, Scanning and Enumeration,System Hacking,Trojans, Backdoors,Virus and Worms,Sniffers,Denial of Services and Session Hijacking,Hacking Web Servers,Web Application Vulnerabilities,Wireless Hacking,Physical Security,Linux Hacking,Cryptography,Penetration Testing Methodologies with Kali Linux
Windows 2012 - Security:
Overview of AD, Access Control, Exploring DNS, AD object, Group Policy,Configuration of AD CS, Overview of PKI Deploying a CA Hierarchy,Configuration of AD RMS, Configurationof VPN Access, Routing and Remote Access Configurationof IPSec,Designing Network Security, Identifying threats to Network Security and Clustering.
Forefront Threat Management Gateway (TMG):
Installing and Maintaining TMG Server Enabling Access to Internet Resources. Configuring TMG as a firewall,Configuring Access to Advanced Application & Web Filtering,Configuring VPN Access & Remote Clients & Networks,Implementing Caching to Browsing performance monitoringTMG, Site-to Site VPN,Implementing TMG Enterprise Edition:Back to Back firewall, Intranet, extranet and DMZ
Linux Security:
Overview of Linux, Creating and Managing Users and Groups,
Package Management, Managing and Creating Partition Table, Introduction to LVM and RAID, Net filter, Iproute2 and Traffic ControlIptables, Layer 7 Filtering,NAT and Packet Mangling with iptables, SNAT, DNAT, PAT. SQUID,
Cisco Security:
Securing the Router for Administrative Access, Securing Administrative Access using AAA and RADIUS.Security Policy Development and Implementation,Using the CLI and SDM, VLAN,Securing Layer 2 Switches,Configuring a Site-to-Site VPN using Cisco IOS and SDM,Configuring a Remote Access VPN Server and Client.
Case Study: UTL has implemented Six State Wide Area Networks and e-governance projects in various states of India.
Overview of couple of these complex networks will be given as case studies to have a perfect understanding of the technologies learnt
G. Mode of evaluation of performance of the ITEC / SCAAP participant /
- Formative assessment on a Weekly / Topic wise, Summative at the end of the course
- Presentations by the participants on a weekly / fortnightly basis.
- Lab experiments and scenarios to analyze the participants practical knowledge