SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
Certified Network
Security Professional
VS-1082
Certified Network Security Professional
www.vskills.in
CCCCertifiedertifiedertifiedertified Network SecurityNetwork SecurityNetwork SecurityNetwork Security ProfessionalProfessionalProfessionalProfessional
Certification CodeCertification CodeCertification CodeCertification Code VS-1082
Vskills certification for Network Security Professional assesses the candidate for a
company’s network security needs. The certification tests the candidates on various areas in
network security which includes knowledge of networking, cryptography, implementation
and management of network security measures.
Why should one take this certification?Why should one take this certification?Why should one take this certification?Why should one take this certification?
This Course is intended for professionals and graduates wanting to excel in their chosen
areas. It is also well suited for those who are already working and would like to take
certification for further career progression.
Earning Vskills Network Security Professional Certification can help candidate differentiate
in today's competitive job market, broaden their employment opportunities by displaying
their advanced skills, and result in higher earning potential.
Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification?
Job seekers looking to find employment in IT or network security department of various
companies, students generally wanting to improve their skill set and make their CV
stronger and existing employees looking for a better role can prove their employers the
value of their skills through this certification
Test DetaiTest DetaiTest DetaiTest Detailslslsls
• Duration:Duration:Duration:Duration: 60 minutes
• No. of questions:No. of questions:No. of questions:No. of questions: 50
• Maximum marks:Maximum marks:Maximum marks:Maximum marks: 50, Passing marks: 25 (50%)
There is no negative marking in this module.
Fee StructureFee StructureFee StructureFee Structure
Rs. 4,500/- (Includes all taxes)
Companies that hire Vskills CertifiedCompanies that hire Vskills CertifiedCompanies that hire Vskills CertifiedCompanies that hire Vskills Certified Network SecurityNetwork SecurityNetwork SecurityNetwork Security ProfessionalProfessionalProfessionalProfessional
Network security professional are in great demand. Companies specializing in securing and
implementation of computer networks are constantly hiring knowledgeable professionals.
Various public and private companies also need network security professional for securing
and managing their computer networks.
Certified Network Security Professional
www.vskills.in
Table of ContentTable of ContentTable of ContentTable of Content
1.1.1.1. Networking ConceptsNetworking ConceptsNetworking ConceptsNetworking Concepts
1.1 Basics of Communication Systems
1.2 Transmission Media, OSI and TCP/IP stack
1.3 LAN, WAN, Wireless networks and internetworking
1.4 Packet formats and ports
2.2.2.2. Security ConceptsSecurity ConceptsSecurity ConceptsSecurity Concepts
2.1 Security principles and concepts
2.2 Identification and authentication
2.3 Attack types
2.4 Computer Forensics and steganography
3.3.3.3. Security PolicySecurity PolicySecurity PolicySecurity Policy
3.1 Security policies and guidelines
3.2 Defining incident handling procedure
4.4.4.4. Security ModelsSecurity ModelsSecurity ModelsSecurity Models
4.1 Security models (Biba , Bell-la padula, etc.)
4.2 Access controls (MAC, policy, DAC, etc.)
5.5.5.5. CryptographyCryptographyCryptographyCryptography
5.1 Evolution and data encryption methods
5.2 Symmetric and Asymmetric key Cryptography
5.3 Private and public key exchange
5.4 Secret key cryptography
5.5 Message Authentication and Hash functions
5.6 Digital Signatures and public key infrastructure
6.6.6.6. Hardware SecurityHardware SecurityHardware SecurityHardware Security
6.1 Smart card
6.2 Access token
6.3 Biometrics
7.7.7.7. Router Hardening and ACLRouter Hardening and ACLRouter Hardening and ACLRouter Hardening and ACL
7.1 Routing Process and router security
7.2 Create and implement access control lists (ACL)
7.3 Remove Unwanted Protocols and Services and router logging
8.8.8.8. IDSIDSIDSIDS
8.1 IDS concepts and types
8.2 Signature detection and log analysis
Certified Network Security Professional
www.vskills.in
9.9.9.9. FirewallsFirewallsFirewallsFirewalls
9.1 Concept, components and types
9.2 Firewall policy, rule sets and packet filters
9.3 Proxy Server, bastion host, DMZ and honeypot
9.4 ISA Server and IPTables
10.10.10.10. Wireless SecurityWireless SecurityWireless SecurityWireless Security
10.1 WAP and AP security
10.2 Wireless PKI
10.3 Wireless Security Solutions and auditing
11.11.11.11. System SecuritySystem SecuritySystem SecuritySystem Security
11.1 Desktop Security
11.2 Email security: PGP and S/MIME
11.3 Web Security: web authentication, SSL, IPSec, TLS and SET
11.4 VPN types and architecture
12.12.12.12. OS SecurityOS SecurityOS SecurityOS Security
12.1 OS Vulnerabilities, updates and patches
12.2 OS integrity checks
12.3 OS hardening (Linux and Windows 2003)
12.4 Trusted OS
13.13.13.13. Security ManagementSecurity ManagementSecurity ManagementSecurity Management
13.1 Network management and SNMP
13.2 Incident response
13.3 Risk Management
13.4 BCP and DR
14.14.14.14. Regulations and complianceRegulations and complianceRegulations and complianceRegulations and compliance
14.1 Law and policies
14.2 IT Act, IPC and copyright act
14.3 Privacy
14.4 Email policy
Certified Network Security Professional
www.vskills.in
Course OutlineCourse OutlineCourse OutlineCourse Outline
Networking ConceptsNetworking ConceptsNetworking ConceptsNetworking Concepts
Understanding the basics of communication systems like sender, media, receiver, etc.
Explaining the various transmission media and concept of OSI and TCP/IP protocols
Describing the concepts of LAN, WAN, wireless networks and internetworking
Detailing the different packet formats used by TCP/IP protocols and ports
Security ConceptsSecurity ConceptsSecurity ConceptsSecurity Concepts
Illustrating the principles and concepts of security
Describing the basics and techniques for identification and authentication
Explaining the various types of attack on computing resources
Detailing the concept of computer forensics for investigation and steganography for
information hiding
Security PolicySecurity PolicySecurity PolicySecurity Policy
Understanding the basics and method for defining security policies and guidelines
Defining the procedure to follow for security incidents
Security ModelsSecurity ModelsSecurity ModelsSecurity Models
Explaining the various security models like Biba , Bell-la padula, etc.
Describing the different types of access controls like mandatory or discretionary, etc.
CryptographyCryptographyCryptographyCryptography
Illustrating the evolution of cryptography and different data encryption ciphers used
Detailing the concepts and techniques for symmetric and asymmetric key
cryptography and private and public key exchange
Understanding the various techniques of secret key cryptography
Explaining the basics of message authentication, hash function, digital signature and
public key infrastructure (PKI)
Hardware SecurityHardware SecurityHardware SecurityHardware Security
Describing the concept and usage of smart card, access token and biometrics for
hardware-based security implementation
Router Hardening and ACLRouter Hardening and ACLRouter Hardening and ACLRouter Hardening and ACL
Understanding the process of routing and provisions for router security
Illustrating the steps to create and implement access control lists (ACL)
Describing the procedure to remove unwanted Protocols and Services and enable
router logging
IDSIDSIDSIDS
Explaining the concepts and types of intrusion detection systems (IDS)
Illustrating the signature detection in IDS and log analysis of IDS systems
Certified Network Security Professional
www.vskills.in
FirewallsFirewallsFirewallsFirewalls
Understanding the concept of firewall and various components and types of firewall
Describing the basics of firewall policy, rule sets and packet filters in firewall
Illustrating proxy server, bastion host, DMZ and honeypot used with firewall for
security management
Explaining the working of ISA Server and IPTables for Windows and Linux
Wireless SecurityWireless SecurityWireless SecurityWireless Security
Describing the basics of wireless application protocol and access point security
Explaining the usage of wireless PKI
Illustrating the various wireless security solutions and need for auditing
SSSSystem Securityystem Securityystem Securityystem Security
Detailing the techniques for desktop security by anti-virus software
Understanding Email security implementation by PGP and S/MIME
Explaining the concepts of web authentication, SSL, IPSec, TLS and SET for
implementing web security
Illustrating the basics of virtual private network (VPN), VPN types and architecture
for implementation
OS SecurityOS SecurityOS SecurityOS Security
Understanding the significance and basics of OS vulnerabilities, updates and patches
Illustrating the concept of OS integrity checks and trusted OS
Describing the techniques for OS hardening for Linux and Windows 2003
Security ManagementSecurity ManagementSecurity ManagementSecurity Management
Describing the essentials for network management and usage of SNMP for same
Explaining the procedure to manage incident response
Illustrating the process of risk management and analysis for securing assets
Understanding the concept and importance of business continuity planning and
disaster recovery for recovering from security incidents
Regulations and complianceRegulations and complianceRegulations and complianceRegulations and compliance
Explaining the relevance of laws and policies
Describing the IT Act, IPC and copyright act as applied to organization
Illustrating the concept and relevance of privacy as applied to data asset
Detailing the steps to publish and importance of email policy
Certified Network Security Professional
www.vskills.in
Sample QuestionsSample QuestionsSample QuestionsSample Questions
1.1.1.1. TheTheTheThe term TLS expandsterm TLS expandsterm TLS expandsterm TLS expands to ________________.to ________________.to ________________.to ________________.
A. Transport Level Security
B. Transport Layer Security
C. Transport Layer Setting
D. None of the above
2222. The. The. The. The cipher in which each letter is replaced by another letter is called _________.cipher in which each letter is replaced by another letter is called _________.cipher in which each letter is replaced by another letter is called _________.cipher in which each letter is replaced by another letter is called _________.
A. Transposition
B. Substitution
C. Hash convert
D. None of the above
3333. The. The. The. The DiffieDiffieDiffieDiffie----Hellman algorithm is used forHellman algorithm is used forHellman algorithm is used forHellman algorithm is used for ____________.____________.____________.____________.
A. Key deletion
B. Key generation
C. Key exchange
D. None of the above
4444. The. The. The. The term S/MIME refers to ____________.term S/MIME refers to ____________.term S/MIME refers to ____________.term S/MIME refers to ____________.
A. Secure/Multipurpose Internet Mail Extensions
B. Secure/Multipurpose Internet Media Extensions
C. Secure/Multipurpose Internet Multimedia Extensions
D. None of the above
5555. The. The. The. The port used by HTTPS protocol is ____________.port used by HTTPS protocol is ____________.port used by HTTPS protocol is ____________.port used by HTTPS protocol is ____________.
A. 443
B. 80
C. 21
D. None of the above
Answers: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)
Network Security Certification

Contenu connexe

Tendances

Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Network Security Projects
Network Security ProjectsNetwork Security Projects
Network Security ProjectsPhdtopiccom
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and TypesVikram Khanna
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security IssuesAfreenYousaf
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network SecurityAditiPatni3
 
Network infrastructure security management solution - A holistic approach in ...
Network infrastructure security management solution - A holistic approach in ...Network infrastructure security management solution - A holistic approach in ...
Network infrastructure security management solution - A holistic approach in ...Twinkle Sebastian
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless NetworkingGulshanAra14
 
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionHTS Hosting
 
Topics in network security
Topics in network securityTopics in network security
Topics in network securityNasir Bhutta
 
Network security
Network securityNetwork security
Network securityAli Kamil
 
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesIcs & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesomriyad
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocolsOnline
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 

Tendances (20)

Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Network Security Projects
Network Security ProjectsNetwork Security Projects
Network Security Projects
 
Network security
Network securityNetwork security
Network security
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security Issues
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Fire walls
Fire wallsFire walls
Fire walls
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Network infrastructure security management solution - A holistic approach in ...
Network infrastructure security management solution - A holistic approach in ...Network infrastructure security management solution - A holistic approach in ...
Network infrastructure security management solution - A holistic approach in ...
 
Network Security
Network SecurityNetwork Security
Network Security
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Network security
Network securityNetwork security
Network security
 
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesIcs & computer security for nuclear facilities
Ics & computer security for nuclear facilities
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 

Similaire à Network Security Certification

Software Security Certification
Software Security CertificationSoftware Security Certification
Software Security CertificationVskills
 
cyber security analyst certification
cyber security analyst certificationcyber security analyst certification
cyber security analyst certificationVskills
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco Service Provider
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco Service Provider
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network DefenderITpreneurs
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Moshe Ferber
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Tech
 
Integrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsIntegrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsUlf Mattsson
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 
Private Key Infrastructure Advantages And Disadvantages
Private Key Infrastructure Advantages And DisadvantagesPrivate Key Infrastructure Advantages And Disadvantages
Private Key Infrastructure Advantages And DisadvantagesAlison Hall
 
Cis 560-Security Access &Amp; Control Strategies Essay
Cis 560-Security Access &Amp; Control Strategies EssayCis 560-Security Access &Amp; Control Strategies Essay
Cis 560-Security Access &Amp; Control Strategies EssaySusan Cox
 
Comp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationComp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationShivamSharma909
 
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated DesignCisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated DesignCisco Russia
 

Similaire à Network Security Certification (20)

Software Security Certification
Software Security CertificationSoftware Security Certification
Software Security Certification
 
cyber security analyst certification
cyber security analyst certificationcyber security analyst certification
cyber security analyst certification
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
 
Integrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsIntegrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOps
 
Cloud Security Solution Overview
Cloud Security Solution OverviewCloud Security Solution Overview
Cloud Security Solution Overview
 
Ccna security
Ccna security Ccna security
Ccna security
 
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Private Key Infrastructure Advantages And Disadvantages
Private Key Infrastructure Advantages And DisadvantagesPrivate Key Infrastructure Advantages And Disadvantages
Private Key Infrastructure Advantages And Disadvantages
 
Cis 560-Security Access &Amp; Control Strategies Essay
Cis 560-Security Access &Amp; Control Strategies EssayCis 560-Security Access &Amp; Control Strategies Essay
Cis 560-Security Access &Amp; Control Strategies Essay
 
Comp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationComp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementation
 
Ccna security
Ccna security Ccna security
Ccna security
 
Ccna security
Ccna security Ccna security
Ccna security
 
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated DesignCisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
 

Plus de Vskills

Vskills certified administrative support professional sample material
Vskills certified administrative support professional sample materialVskills certified administrative support professional sample material
Vskills certified administrative support professional sample materialVskills
 
vskills customer service professional sample material
vskills customer service professional sample materialvskills customer service professional sample material
vskills customer service professional sample materialVskills
 
Vskills certified operations manager sample material
Vskills certified operations manager sample materialVskills certified operations manager sample material
Vskills certified operations manager sample materialVskills
 
Vskills certified six sigma yellow belt sample material
Vskills certified six sigma yellow belt sample materialVskills certified six sigma yellow belt sample material
Vskills certified six sigma yellow belt sample materialVskills
 
Vskills production and operations management sample material
Vskills production and operations management sample materialVskills production and operations management sample material
Vskills production and operations management sample materialVskills
 
vskills leadership skills professional sample material
vskills leadership skills professional sample materialvskills leadership skills professional sample material
vskills leadership skills professional sample materialVskills
 
vskills facility management expert sample material
vskills facility management expert sample materialvskills facility management expert sample material
vskills facility management expert sample materialVskills
 
Vskills international trade and forex professional sample material
Vskills international trade and forex professional sample materialVskills international trade and forex professional sample material
Vskills international trade and forex professional sample materialVskills
 
Vskills production planning and control professional sample material
Vskills production planning and control professional sample materialVskills production planning and control professional sample material
Vskills production planning and control professional sample materialVskills
 
Vskills purchasing and material management professional sample material
Vskills purchasing and material management professional sample materialVskills purchasing and material management professional sample material
Vskills purchasing and material management professional sample materialVskills
 
Vskills manufacturing technology management professional sample material
Vskills manufacturing technology management professional sample materialVskills manufacturing technology management professional sample material
Vskills manufacturing technology management professional sample materialVskills
 
certificate in agile project management sample material
certificate in agile project management sample materialcertificate in agile project management sample material
certificate in agile project management sample materialVskills
 
Vskills angular js sample material
Vskills angular js sample materialVskills angular js sample material
Vskills angular js sample materialVskills
 
Vskills c++ developer sample material
Vskills c++ developer sample materialVskills c++ developer sample material
Vskills c++ developer sample materialVskills
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample materialVskills
 
Vskills financial modelling professional sample material
Vskills financial modelling professional sample materialVskills financial modelling professional sample material
Vskills financial modelling professional sample materialVskills
 
Vskills basel iii professional sample material
Vskills basel iii professional sample materialVskills basel iii professional sample material
Vskills basel iii professional sample materialVskills
 
Vskills telecom management professional sample material
Vskills telecom management professional sample materialVskills telecom management professional sample material
Vskills telecom management professional sample materialVskills
 
Vskills retail management professional sample material
Vskills retail management professional sample materialVskills retail management professional sample material
Vskills retail management professional sample materialVskills
 
Vskills contract law analyst sample material
Vskills contract law analyst sample materialVskills contract law analyst sample material
Vskills contract law analyst sample materialVskills
 

Plus de Vskills (20)

Vskills certified administrative support professional sample material
Vskills certified administrative support professional sample materialVskills certified administrative support professional sample material
Vskills certified administrative support professional sample material
 
vskills customer service professional sample material
vskills customer service professional sample materialvskills customer service professional sample material
vskills customer service professional sample material
 
Vskills certified operations manager sample material
Vskills certified operations manager sample materialVskills certified operations manager sample material
Vskills certified operations manager sample material
 
Vskills certified six sigma yellow belt sample material
Vskills certified six sigma yellow belt sample materialVskills certified six sigma yellow belt sample material
Vskills certified six sigma yellow belt sample material
 
Vskills production and operations management sample material
Vskills production and operations management sample materialVskills production and operations management sample material
Vskills production and operations management sample material
 
vskills leadership skills professional sample material
vskills leadership skills professional sample materialvskills leadership skills professional sample material
vskills leadership skills professional sample material
 
vskills facility management expert sample material
vskills facility management expert sample materialvskills facility management expert sample material
vskills facility management expert sample material
 
Vskills international trade and forex professional sample material
Vskills international trade and forex professional sample materialVskills international trade and forex professional sample material
Vskills international trade and forex professional sample material
 
Vskills production planning and control professional sample material
Vskills production planning and control professional sample materialVskills production planning and control professional sample material
Vskills production planning and control professional sample material
 
Vskills purchasing and material management professional sample material
Vskills purchasing and material management professional sample materialVskills purchasing and material management professional sample material
Vskills purchasing and material management professional sample material
 
Vskills manufacturing technology management professional sample material
Vskills manufacturing technology management professional sample materialVskills manufacturing technology management professional sample material
Vskills manufacturing technology management professional sample material
 
certificate in agile project management sample material
certificate in agile project management sample materialcertificate in agile project management sample material
certificate in agile project management sample material
 
Vskills angular js sample material
Vskills angular js sample materialVskills angular js sample material
Vskills angular js sample material
 
Vskills c++ developer sample material
Vskills c++ developer sample materialVskills c++ developer sample material
Vskills c++ developer sample material
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample material
 
Vskills financial modelling professional sample material
Vskills financial modelling professional sample materialVskills financial modelling professional sample material
Vskills financial modelling professional sample material
 
Vskills basel iii professional sample material
Vskills basel iii professional sample materialVskills basel iii professional sample material
Vskills basel iii professional sample material
 
Vskills telecom management professional sample material
Vskills telecom management professional sample materialVskills telecom management professional sample material
Vskills telecom management professional sample material
 
Vskills retail management professional sample material
Vskills retail management professional sample materialVskills retail management professional sample material
Vskills retail management professional sample material
 
Vskills contract law analyst sample material
Vskills contract law analyst sample materialVskills contract law analyst sample material
Vskills contract law analyst sample material
 

Dernier

Practical Research 1: Lesson 8 Writing the Thesis Statement.pptx
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptxPractical Research 1: Lesson 8 Writing the Thesis Statement.pptx
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptxKatherine Villaluna
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfMohonDas
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...raviapr7
 
Patterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptxPatterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptxMYDA ANGELICA SUAN
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxraviapr7
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfMohonDas
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?TechSoup
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17Celine George
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRATanmoy Mishra
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptxSandy Millin
 
M-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxM-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxDr. Santhosh Kumar. N
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapitolTechU
 
How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17Celine George
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxAditiChauhan701637
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice documentXsasf Sfdfasd
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxheathfieldcps1
 
UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE
 
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxEduSkills OECD
 

Dernier (20)

Prelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quizPrelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quiz
 
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptx
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptxPractical Research 1: Lesson 8 Writing the Thesis Statement.pptx
Practical Research 1: Lesson 8 Writing the Thesis Statement.pptx
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdf
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...
 
Patterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptxPatterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptx
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptx
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdf
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
 
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdfPersonal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
 
M-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxM-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptx
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptx
 
How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptx
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice document
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
 
UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024
 
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
 

Network Security Certification

  • 2. Certified Network Security Professional www.vskills.in CCCCertifiedertifiedertifiedertified Network SecurityNetwork SecurityNetwork SecurityNetwork Security ProfessionalProfessionalProfessionalProfessional Certification CodeCertification CodeCertification CodeCertification Code VS-1082 Vskills certification for Network Security Professional assesses the candidate for a company’s network security needs. The certification tests the candidates on various areas in network security which includes knowledge of networking, cryptography, implementation and management of network security measures. Why should one take this certification?Why should one take this certification?Why should one take this certification?Why should one take this certification? This Course is intended for professionals and graduates wanting to excel in their chosen areas. It is also well suited for those who are already working and would like to take certification for further career progression. Earning Vskills Network Security Professional Certification can help candidate differentiate in today's competitive job market, broaden their employment opportunities by displaying their advanced skills, and result in higher earning potential. Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification? Job seekers looking to find employment in IT or network security department of various companies, students generally wanting to improve their skill set and make their CV stronger and existing employees looking for a better role can prove their employers the value of their skills through this certification Test DetaiTest DetaiTest DetaiTest Detailslslsls • Duration:Duration:Duration:Duration: 60 minutes • No. of questions:No. of questions:No. of questions:No. of questions: 50 • Maximum marks:Maximum marks:Maximum marks:Maximum marks: 50, Passing marks: 25 (50%) There is no negative marking in this module. Fee StructureFee StructureFee StructureFee Structure Rs. 4,500/- (Includes all taxes) Companies that hire Vskills CertifiedCompanies that hire Vskills CertifiedCompanies that hire Vskills CertifiedCompanies that hire Vskills Certified Network SecurityNetwork SecurityNetwork SecurityNetwork Security ProfessionalProfessionalProfessionalProfessional Network security professional are in great demand. Companies specializing in securing and implementation of computer networks are constantly hiring knowledgeable professionals. Various public and private companies also need network security professional for securing and managing their computer networks.
  • 3. Certified Network Security Professional www.vskills.in Table of ContentTable of ContentTable of ContentTable of Content 1.1.1.1. Networking ConceptsNetworking ConceptsNetworking ConceptsNetworking Concepts 1.1 Basics of Communication Systems 1.2 Transmission Media, OSI and TCP/IP stack 1.3 LAN, WAN, Wireless networks and internetworking 1.4 Packet formats and ports 2.2.2.2. Security ConceptsSecurity ConceptsSecurity ConceptsSecurity Concepts 2.1 Security principles and concepts 2.2 Identification and authentication 2.3 Attack types 2.4 Computer Forensics and steganography 3.3.3.3. Security PolicySecurity PolicySecurity PolicySecurity Policy 3.1 Security policies and guidelines 3.2 Defining incident handling procedure 4.4.4.4. Security ModelsSecurity ModelsSecurity ModelsSecurity Models 4.1 Security models (Biba , Bell-la padula, etc.) 4.2 Access controls (MAC, policy, DAC, etc.) 5.5.5.5. CryptographyCryptographyCryptographyCryptography 5.1 Evolution and data encryption methods 5.2 Symmetric and Asymmetric key Cryptography 5.3 Private and public key exchange 5.4 Secret key cryptography 5.5 Message Authentication and Hash functions 5.6 Digital Signatures and public key infrastructure 6.6.6.6. Hardware SecurityHardware SecurityHardware SecurityHardware Security 6.1 Smart card 6.2 Access token 6.3 Biometrics 7.7.7.7. Router Hardening and ACLRouter Hardening and ACLRouter Hardening and ACLRouter Hardening and ACL 7.1 Routing Process and router security 7.2 Create and implement access control lists (ACL) 7.3 Remove Unwanted Protocols and Services and router logging 8.8.8.8. IDSIDSIDSIDS 8.1 IDS concepts and types 8.2 Signature detection and log analysis
  • 4. Certified Network Security Professional www.vskills.in 9.9.9.9. FirewallsFirewallsFirewallsFirewalls 9.1 Concept, components and types 9.2 Firewall policy, rule sets and packet filters 9.3 Proxy Server, bastion host, DMZ and honeypot 9.4 ISA Server and IPTables 10.10.10.10. Wireless SecurityWireless SecurityWireless SecurityWireless Security 10.1 WAP and AP security 10.2 Wireless PKI 10.3 Wireless Security Solutions and auditing 11.11.11.11. System SecuritySystem SecuritySystem SecuritySystem Security 11.1 Desktop Security 11.2 Email security: PGP and S/MIME 11.3 Web Security: web authentication, SSL, IPSec, TLS and SET 11.4 VPN types and architecture 12.12.12.12. OS SecurityOS SecurityOS SecurityOS Security 12.1 OS Vulnerabilities, updates and patches 12.2 OS integrity checks 12.3 OS hardening (Linux and Windows 2003) 12.4 Trusted OS 13.13.13.13. Security ManagementSecurity ManagementSecurity ManagementSecurity Management 13.1 Network management and SNMP 13.2 Incident response 13.3 Risk Management 13.4 BCP and DR 14.14.14.14. Regulations and complianceRegulations and complianceRegulations and complianceRegulations and compliance 14.1 Law and policies 14.2 IT Act, IPC and copyright act 14.3 Privacy 14.4 Email policy
  • 5. Certified Network Security Professional www.vskills.in Course OutlineCourse OutlineCourse OutlineCourse Outline Networking ConceptsNetworking ConceptsNetworking ConceptsNetworking Concepts Understanding the basics of communication systems like sender, media, receiver, etc. Explaining the various transmission media and concept of OSI and TCP/IP protocols Describing the concepts of LAN, WAN, wireless networks and internetworking Detailing the different packet formats used by TCP/IP protocols and ports Security ConceptsSecurity ConceptsSecurity ConceptsSecurity Concepts Illustrating the principles and concepts of security Describing the basics and techniques for identification and authentication Explaining the various types of attack on computing resources Detailing the concept of computer forensics for investigation and steganography for information hiding Security PolicySecurity PolicySecurity PolicySecurity Policy Understanding the basics and method for defining security policies and guidelines Defining the procedure to follow for security incidents Security ModelsSecurity ModelsSecurity ModelsSecurity Models Explaining the various security models like Biba , Bell-la padula, etc. Describing the different types of access controls like mandatory or discretionary, etc. CryptographyCryptographyCryptographyCryptography Illustrating the evolution of cryptography and different data encryption ciphers used Detailing the concepts and techniques for symmetric and asymmetric key cryptography and private and public key exchange Understanding the various techniques of secret key cryptography Explaining the basics of message authentication, hash function, digital signature and public key infrastructure (PKI) Hardware SecurityHardware SecurityHardware SecurityHardware Security Describing the concept and usage of smart card, access token and biometrics for hardware-based security implementation Router Hardening and ACLRouter Hardening and ACLRouter Hardening and ACLRouter Hardening and ACL Understanding the process of routing and provisions for router security Illustrating the steps to create and implement access control lists (ACL) Describing the procedure to remove unwanted Protocols and Services and enable router logging IDSIDSIDSIDS Explaining the concepts and types of intrusion detection systems (IDS) Illustrating the signature detection in IDS and log analysis of IDS systems
  • 6. Certified Network Security Professional www.vskills.in FirewallsFirewallsFirewallsFirewalls Understanding the concept of firewall and various components and types of firewall Describing the basics of firewall policy, rule sets and packet filters in firewall Illustrating proxy server, bastion host, DMZ and honeypot used with firewall for security management Explaining the working of ISA Server and IPTables for Windows and Linux Wireless SecurityWireless SecurityWireless SecurityWireless Security Describing the basics of wireless application protocol and access point security Explaining the usage of wireless PKI Illustrating the various wireless security solutions and need for auditing SSSSystem Securityystem Securityystem Securityystem Security Detailing the techniques for desktop security by anti-virus software Understanding Email security implementation by PGP and S/MIME Explaining the concepts of web authentication, SSL, IPSec, TLS and SET for implementing web security Illustrating the basics of virtual private network (VPN), VPN types and architecture for implementation OS SecurityOS SecurityOS SecurityOS Security Understanding the significance and basics of OS vulnerabilities, updates and patches Illustrating the concept of OS integrity checks and trusted OS Describing the techniques for OS hardening for Linux and Windows 2003 Security ManagementSecurity ManagementSecurity ManagementSecurity Management Describing the essentials for network management and usage of SNMP for same Explaining the procedure to manage incident response Illustrating the process of risk management and analysis for securing assets Understanding the concept and importance of business continuity planning and disaster recovery for recovering from security incidents Regulations and complianceRegulations and complianceRegulations and complianceRegulations and compliance Explaining the relevance of laws and policies Describing the IT Act, IPC and copyright act as applied to organization Illustrating the concept and relevance of privacy as applied to data asset Detailing the steps to publish and importance of email policy
  • 7. Certified Network Security Professional www.vskills.in Sample QuestionsSample QuestionsSample QuestionsSample Questions 1.1.1.1. TheTheTheThe term TLS expandsterm TLS expandsterm TLS expandsterm TLS expands to ________________.to ________________.to ________________.to ________________. A. Transport Level Security B. Transport Layer Security C. Transport Layer Setting D. None of the above 2222. The. The. The. The cipher in which each letter is replaced by another letter is called _________.cipher in which each letter is replaced by another letter is called _________.cipher in which each letter is replaced by another letter is called _________.cipher in which each letter is replaced by another letter is called _________. A. Transposition B. Substitution C. Hash convert D. None of the above 3333. The. The. The. The DiffieDiffieDiffieDiffie----Hellman algorithm is used forHellman algorithm is used forHellman algorithm is used forHellman algorithm is used for ____________.____________.____________.____________. A. Key deletion B. Key generation C. Key exchange D. None of the above 4444. The. The. The. The term S/MIME refers to ____________.term S/MIME refers to ____________.term S/MIME refers to ____________.term S/MIME refers to ____________. A. Secure/Multipurpose Internet Mail Extensions B. Secure/Multipurpose Internet Media Extensions C. Secure/Multipurpose Internet Multimedia Extensions D. None of the above 5555. The. The. The. The port used by HTTPS protocol is ____________.port used by HTTPS protocol is ____________.port used by HTTPS protocol is ____________.port used by HTTPS protocol is ____________. A. 443 B. 80 C. 21 D. None of the above Answers: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)