E

EASYEXPLANATION

LEARNING MADE EASIER

COURSES
NEC LICENSE
BLOG
ABOUT US
YOUTUBE
COURSES
NEC LICENSE
BLOG
ABOUT US
YOUTUBE

INTRODUCTION TO NETWORK SECURITY

  • 1.1Importance of network security in modern infrastructure
  • Threat landscape: types of attacks, actors, and motivations
  • Confidentiality, Integrity, and Availability (CIA triad)
  • Authentication, Authorization, and Accountability (AAA)
  • Security Policies and Standards

2 THREATS AND VULNURABILITIES

  • Introduction -Threats and Vulnerabilities
  • DoS/DDoS, IP spoofing
  • ARP poisoning, DNS spoofing, and MAC flooding
  • Protocol-specific vulnerabilities (e.g., DNS cache poisoning)
  • Vulnerability scanning and patch management
  • Tools: Nessus, OpenVAS

NETWORK SECURITY DEVICES AND TECHNOLOGIES

  • Types (stateful, stateless, application-layer firewalls)
  • Configuring firewall rules and policies
  • Difference between IDS and IPS
  • Network-based and Host-based IDS
  • Types of VPNs (site-to-site, remote access)
  • NAC(Network Access Control) concepts and implementation

NETWORK TRAFFIC ANALYSIS

  • Importance of packet analysis in security
  • Importance of packet analysis in security
  • Packet capture and packet analysis tools (e.g., Wireshark, tcpdump)
  • Network baselining, identifying anomalies
  • Protocol analysis, flow analysis
  • Syslog, NetFlow, SIEM (Splunk, Elastic Stack)
  • Analyzing and interpreting logs

CRYPTOGRAPHY AND NETWORK SECURITY

  • Fundamental of Cryptography
  • Symmetric and Asymmetric Cryptography
  • Cryptography Algorithms and Numericals
  • Hash functions, digital signatures, certificates
  • Public Key Infrastructure (PKI) concepts
  • SSL/TLS protocols
  • Encrypting traffic over network protocols
  • SSH, and HTTPS

NETWORK SECURITY ANALYSIS AND FORENSIC

  • Incident handling and response lifecycle
  • Evidence collection, preservation, and chain of custody
  • Log analysis and event correlation
  • Deep packet inspection (DPI) and identifying patterns

SECURING WIRELESS NETWORKS

  • Wireless protocols and standards (WEP, WPA, WPA2, WPA3)
  • Wireless vulnerabilities and attacks (e.g., deauthentication attacks)
  • Implementing secure authentication (e.g., EAP, 802.1X)
  • Securing wireless access points and network segmentation

ADVANCED TOPICS IN NETWORK SECURITY

  • Core concepts and design principles
  • Implementing a zero-trust network model
  • Cloud-specific threats and best practices
  • Cloud network security tools and configurations
  • Threat intelligence and proactive defense

Wireless protocols and standards (WEP, WPA, WPA2, WPA3)

WEP, WPA, WPA2 ,WPA3

 

NETWORK SECURITY ANALYSIS AND FORENSIC← Deep packet inspection (DPI) and identifying patterns
SECURING WIRELESS NETWORKSWireless vulnerabilities and attacks (e.g., deauthentication attacks) →
E

EASYEXPLANATION

LEARNING MADE EASIER

Your journey to success starts with knowledge. Keep striving, keep achieving!

Contact us

Jwagal,Lalitpur,Nepal

Phone: +977-9840143772

Email: info@infographytech.com

© 2025 Infography Technologies Pvt Ltd. All rights reserved.