Course Features
Training Type
Course Duration
Training Test
Batch Available
Skill Level
Latest Technology Coverage
CISCO, AWS, MICROSOFT, Certificate Courses
Hands-on-Lab experience,one-to-one Problem Solving Session

Register for Demo


    Security operations and administration is the task of identifying an organization’s information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined. This will ensure the proper handling of all hard copy and electronic information.


    Every time you hear in the news that a security breach has occurred in a renowned organization, and hackers have gained access to confidential information, it is almost always referring to database breach. With the plethora of apps, websites, and other platforms available, the wealth of information that these digital platforms possess are stored in databases and it is essential for them to be secure. This is where a database administrator comes in. It is the responsibility of database administrators to ensure that the databases and other similar sources of data remain secure and protected from unauthorized access. Cybersecurity architects design the security system for an organization, which is then implemented by security engineers, and then run by the security administrators. They are responsible for routine tasks each day, such as setting up new accounts, granting access rights to each account and increasing or reducing the permissions each account has, as well as managing the user’s roles along with their information. They are also sometimes responsible for briefing the teams and other departments the latest developments in information security threats, and thus must be aware of the best practices as well as the security policies. There are various levels of being a security administrator, from an entry-level to a senior level position. Senior security administrators can be expected to occupy the position of Chief Security Officers as well, in large organizations. In order to secure an entry-level position as a security administrator, it is necessary to have a bachelor’s degree, preferably in computer science, cybersecurity, or any related field.


    Module 1: Introduction to Network Security

    • Network topology; Network Types and the OSI Model

    Module 2: Network Protocols

    • Network Protocols: SLIP; PPP; ARP; RARP; IGMP; ICMP; SNMP, HTTP
    • IP: Attacks and Countermeasures
    • TCP, UDP: Attacks and Countermeasures
    • FTP, TFTP, TELNET, SMTP: Vulnerabilities

    Module 3: Security Policy

    • What is Security Policy?
    • What Defines a good security policy
    • Security Policy Structure
    • Developing and Implementing security policies
    • Requirements of Effective Security Policy

    Module 4: Physical Security

    • Physical Security Threats
    • Locks and Keys
    • Fire Safety: Fire Suppression, Gaseous Emission Systems
    • Laptop Security: Physical Security Countermeasures
    • Biometric Devices
    • PC Security: Boot Access

    Module 5: Network Attacks

    • Current Statistics
    • Defining Terms: Threats, Attack and Exploit
    • Classification of Hackers and Attacks
    • Spoofing; Spamming; Eaves Dropping; Phishing; War Dialing; Password Cracking
    • Web Page Defacement; SQL Injection; Wire Tapping; Buffer Overflow
    • War Driving; War Chalking; War Flying
    • Denial of Service (DOS) Attacks and Distributed DOS

    Module 6: Intrusion Detection System

    • Characteristics of IDS
    • Host based IDS Vs Network based IDS
    • IDS Detection Methods; Types of Signatures
    • Intrusion Prevention System
    • IDS Vs IPS
    • IPS Tool

    Module 7: Firewalls

    • Handling threats and security tasks
    • Protection against hacking
    • Centralization and Documentation
    • Multi-layer firewall protection
    • Packet filtering and Stateful Packet Filtering
    • Multi firewall DMZ
    • Specialty firewalls and Reverse firewalls

    Module8: Packet Filtering and Proxy Servers

    • Network Address Translation
    • Application layer gateway and Proxying
    • Virtual Private Network and the Authentication process

    Module 9: Bastion Host and Honeypots

    • Bastion Host
    • Honeypots and Honeynet

    Module 10: Hardening Routers

    • Internet work Operating Systems (IOS)
    • Troubleshooting a router
    • Hardening a Router
    • Components of router security
    • Router security: testing tools

    Module 11: Hardening Operating Systems Security

    • Windows Security
    • Objects And Permissions
    • NTFS File System Permissions
    • Active Directory
    • Kerberos Authentication And Security
    • IP Security
    • Linux

    Module 12: Patch Management

    • Red Hat Up2date Patch Management Utility Installation Steps
    • Microsoft Patch Management Process and Windows Update Services
    • Patch Management Tools: Qchain
    • Patch Management Tool: Microsoft Baseline Security Analyzer
    • Other Patch Management Tools

    Module 13: Application Security

    • Securing Web Applications
    • IPSec And SSL Security
    • Writing Secure Code; Best Practices
    • Remote Administration Security

    Module 14: Web Security

    • Network Devices and Design
    • Altering the Network Addresses
    • Client Authorization and Secure Client Transmissions
    • Portable Applications
    • Malicious Code Detection
    • Browser Security Settings
    • Common Gateway Interface (CGI)
    • Web Application Input Data Validation and Buffer Overflows

    Module 15: E-Mail Security

    • Components Of An Email
    • E-mail protocols
    • E-Mail Security Risks
    • How to defend against E-Mail security risks

    Module 16: Encryption

    • Firewalls Implementing Encryption
    • Maintaining confidentiality
    • Digital certificates
    • Public and Private Keys (including PGP)
    • Choosing the size of keys
    • Analyzing popular encryption schemes including IPSEC

    Module 17: Virtual Private Networks

    • VPN Tunneling Protocols
    • PPTP and L2TP
    • VPN Security

    Module 18: WLAN

    • Wireless Network Types
    • Antenna
    • WLAN Standards
    • BlueTooth And Ultra Wideband
    • WEP Description Tool (Air Snort and WEPCrack)
    • WLAN Security;WPA; TKIP; WTLS
    • EAP Methods
    • Advanced Encryption Standards (AES); DES; RSA Encryption
    • RADIUS; Multifactor Authentication
    • Mobile Security Through Certificates
    • Certificate Management Through PKI

    Module 19: Creating Fault Tolerance

    • Network Security: Fault Tolerance
    • Why Create Fault Tolerance
    • Planning For Fault Tolerance
    • Reasons For System Failure
    • Preventive Measures

    Module 20: Incident Response

    • What Is an Incident
    • Step by Step Procedure
    • Managing Incidents
    • What Is an Incident Response
    • Six Step Approach for Incident Handling (PICERF Methodology)
    • Incident Response Team

    Module 21: Disaster Recovery and Planning

    • What is a Disaster Recovery
    • Disaster Recovery Planning
    • Business Continuity Planning Process
    • Disaster Prevention

    Module 22: Network Vulnerability Assessment

    • Vulnerability Assessment
    • Goals of vulnerability assessment
    • Network vulnerability Assessment methodology:
    • Selecting vulnerability assessment tool


    To use my skills and experience for helping other people and making a difference in society by protecting that which people hold precious to them.


    • Implementing policies and ensuring that they are followed by the team
    • In-depth knowledge of managing intrusion detection, antivirus environment, vulnerability management, and data leakage prevention.
    • Proficient in the use of basic automation tools such as Lotus Notes, MS office, and Share Point.
    • Working knowledge and understanding of ICD 704 & 705 along with applicable Sponsor procedures.
    • Strong leadership and interpersonal skills, along with the ability to interact with different stakeholders of the organization.
    • In-depth knowledge of IP Networking
    • Proficient in the use of Microsoft Office Excel and Word.

    Why Choose Wanforce

    Robust IT Infrastructure

    24x7 Support

    Best Learning Environment

    Best Price Guaranteed

    Variable Length Subscription