E

EASYEXPLANATION

LEARNING MADE EASIER

COURSES
NEC LICENSE
BLOG
ABOUT US
YOUTUBE
COURSES
NEC LICENSE
BLOG
ABOUT US
YOUTUBE

1. OVERVIEW OF INFORMATION SECURITY

  • Introduction to information security, Confidentiality, Integrity, Availability, Authentication, Non-Repudiation
  • Access control
  • Threats, Vulnerabilities, Exploits
  • Risk, Risk analysis, Risk Management Cycle

2. INFORMATION AND NETWORK SECURITY POLICIES

  • Security policies and objectives
  • Types of policies: confidentiality policies, integrity policies, hybrid policies
  • Bell-Lapadula model
  • Biba integrity model
  • Clark Wilson integrity model
  • Chinese Wall model
  • Clinical information systems
  • PRACTICAL EXERCISE - DLP AND SIEM TOOLS

3. CRYPTOGRAPHY AND PKI

  • Encryption - Symmetric and Asymmetric Encryption
  • Symmetric Key Algorithm-DES,3DES
  • RSA Elliptic Key Encryption
  • Deffie Hellman Algorithm
  • Session vs Interchange Key
  • Hash Functions
  • Digital Signatures
  • Cryptographic Key Infrastructure
  • Certificates
  • X.509
  • Storing and Revoking Keys
  • Key Escrow

4. NETWORK SECURITY APPLICATIONS

  • OSI architecture review
  • Authentication applications
  • IP security
  • VPN
  • Network management security
  • Email Security
  • Web Security
  • SSL
  • TLS
  • Security in mobile devices
  • Security in virtual environments and the cloud

5. DESIGN PRINCIPLES

  • Overview
  • principle of least privilege,
  • principle of fail-safe defaults
  • principle of economy of mechanism
  • principle of complete mediation
  • principle of open design
  • principle of separation of privilege
  • principle of least common mechanism
  • principle of psychological acceptabil
  • Compliance and regulations

6. COMPLIANCE EVALUATION SYSTEM AND LAW

  • PCI DSS
  • SOX
  • HIPPA,
  • evaluating systems
  • Evaluating systems, goals of evaluating systems
  • TCSEC
  • ITSEC
  • FIPS
  • Common Criteria
  • SSE-CMM
  • Law and information security
  • historical evolution of computer related law in the US
  • Privacy law and its significance to information security
  • The UK DPA and the EU GDPR
  • ETA of Nepal

7. MALICIOUS LOGIC AND ATTACKS

  • Malicious logic
  • Trojan horses
  • Viruses and its Types
  • Worms
  • Logic Bombs
  • Common Attacks and Examples
  • Defenses

8. VULNERABILITY ANALYSIS AND IT AUDIT

  • Introduction
  • Vulnerability Assessment Tools
  • Penetration Testing and Objectives
  • Black-box, Grey-box and White-Box Tests
  • Information Technology Audit
  • IT Audit Process
  • Audit Report and its Significance
  • COBIT

9. INTRUSION DETECTION AND LOG ANALYSIS

  • Intrusion
  • Intrusion Detection System
  • Intrusion Prevention System
  • Log Auditing
  • Log Management
  • Incident Handling-SIEM, UEBA
  • Log Based Intrusion Detection System

LAB WORK -ISA

  • 1. Creating Your Own Bot using any Language
  • Implementation of Access Control List using Packet Tracer
  • Implement Encryption/Decryption Algorithm in any Language

SOLVED PRACTICE QUESTIONS

  • PRACTICE QUESTION 1
  • Practice Question 2- IDS

Log Based Intrusion Detection System

LOG BASED IDS 

 

9. INTRUSION DETECTION AND LOG ANALYSIS← Incident Handling-SIEM, UEBA
LAB WORK -ISA1. Creating Your Own Bot using any Language →
E

EASYEXPLANATION

LEARNING MADE EASIER

Your journey to success starts with knowledge. Keep striving, keep achieving!

Contact us

Jwagal,Lalitpur,Nepal

Phone: +977-9840143772

Email: info@infographytech.com

© 2025 Infography Technologies Pvt Ltd. All rights reserved.