Vskills certification for Network Security Professional assesses the candidate for a company’s network security needs. The certification tests the candidates on various areas in network security which includes knowledge of networking, cryptography, implementation and management of network security measures.
http://www.vskills.in/certification/Certified-Network-Security-Professional
2. Certified Network Security Professional
www.vskills.in
CCCCertifiedertifiedertifiedertified Network SecurityNetwork SecurityNetwork SecurityNetwork Security ProfessionalProfessionalProfessionalProfessional
Certification CodeCertification CodeCertification CodeCertification Code VS-1082
Vskills certification for Network Security Professional assesses the candidate for a
company’s network security needs. The certification tests the candidates on various areas in
network security which includes knowledge of networking, cryptography, implementation
and management of network security measures.
Why should one take this certification?Why should one take this certification?Why should one take this certification?Why should one take this certification?
This Course is intended for professionals and graduates wanting to excel in their chosen
areas. It is also well suited for those who are already working and would like to take
certification for further career progression.
Earning Vskills Network Security Professional Certification can help candidate differentiate
in today's competitive job market, broaden their employment opportunities by displaying
their advanced skills, and result in higher earning potential.
Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification?
Job seekers looking to find employment in IT or network security department of various
companies, students generally wanting to improve their skill set and make their CV
stronger and existing employees looking for a better role can prove their employers the
value of their skills through this certification
Test DetaiTest DetaiTest DetaiTest Detailslslsls
• Duration:Duration:Duration:Duration: 60 minutes
• No. of questions:No. of questions:No. of questions:No. of questions: 50
• Maximum marks:Maximum marks:Maximum marks:Maximum marks: 50, Passing marks: 25 (50%)
There is no negative marking in this module.
Fee StructureFee StructureFee StructureFee Structure
Rs. 4,500/- (Includes all taxes)
Companies that hire Vskills CertifiedCompanies that hire Vskills CertifiedCompanies that hire Vskills CertifiedCompanies that hire Vskills Certified Network SecurityNetwork SecurityNetwork SecurityNetwork Security ProfessionalProfessionalProfessionalProfessional
Network security professional are in great demand. Companies specializing in securing and
implementation of computer networks are constantly hiring knowledgeable professionals.
Various public and private companies also need network security professional for securing
and managing their computer networks.
3. Certified Network Security Professional
www.vskills.in
Table of ContentTable of ContentTable of ContentTable of Content
1.1.1.1. Networking ConceptsNetworking ConceptsNetworking ConceptsNetworking Concepts
1.1 Basics of Communication Systems
1.2 Transmission Media, OSI and TCP/IP stack
1.3 LAN, WAN, Wireless networks and internetworking
1.4 Packet formats and ports
2.2.2.2. Security ConceptsSecurity ConceptsSecurity ConceptsSecurity Concepts
2.1 Security principles and concepts
2.2 Identification and authentication
2.3 Attack types
2.4 Computer Forensics and steganography
3.3.3.3. Security PolicySecurity PolicySecurity PolicySecurity Policy
3.1 Security policies and guidelines
3.2 Defining incident handling procedure
4.4.4.4. Security ModelsSecurity ModelsSecurity ModelsSecurity Models
4.1 Security models (Biba , Bell-la padula, etc.)
4.2 Access controls (MAC, policy, DAC, etc.)
5.5.5.5. CryptographyCryptographyCryptographyCryptography
5.1 Evolution and data encryption methods
5.2 Symmetric and Asymmetric key Cryptography
5.3 Private and public key exchange
5.4 Secret key cryptography
5.5 Message Authentication and Hash functions
5.6 Digital Signatures and public key infrastructure
6.6.6.6. Hardware SecurityHardware SecurityHardware SecurityHardware Security
6.1 Smart card
6.2 Access token
6.3 Biometrics
7.7.7.7. Router Hardening and ACLRouter Hardening and ACLRouter Hardening and ACLRouter Hardening and ACL
7.1 Routing Process and router security
7.2 Create and implement access control lists (ACL)
7.3 Remove Unwanted Protocols and Services and router logging
8.8.8.8. IDSIDSIDSIDS
8.1 IDS concepts and types
8.2 Signature detection and log analysis
4. Certified Network Security Professional
www.vskills.in
9.9.9.9. FirewallsFirewallsFirewallsFirewalls
9.1 Concept, components and types
9.2 Firewall policy, rule sets and packet filters
9.3 Proxy Server, bastion host, DMZ and honeypot
9.4 ISA Server and IPTables
10.10.10.10. Wireless SecurityWireless SecurityWireless SecurityWireless Security
10.1 WAP and AP security
10.2 Wireless PKI
10.3 Wireless Security Solutions and auditing
11.11.11.11. System SecuritySystem SecuritySystem SecuritySystem Security
11.1 Desktop Security
11.2 Email security: PGP and S/MIME
11.3 Web Security: web authentication, SSL, IPSec, TLS and SET
11.4 VPN types and architecture
12.12.12.12. OS SecurityOS SecurityOS SecurityOS Security
12.1 OS Vulnerabilities, updates and patches
12.2 OS integrity checks
12.3 OS hardening (Linux and Windows 2003)
12.4 Trusted OS
13.13.13.13. Security ManagementSecurity ManagementSecurity ManagementSecurity Management
13.1 Network management and SNMP
13.2 Incident response
13.3 Risk Management
13.4 BCP and DR
14.14.14.14. Regulations and complianceRegulations and complianceRegulations and complianceRegulations and compliance
14.1 Law and policies
14.2 IT Act, IPC and copyright act
14.3 Privacy
14.4 Email policy
5. Certified Network Security Professional
www.vskills.in
Course OutlineCourse OutlineCourse OutlineCourse Outline
Networking ConceptsNetworking ConceptsNetworking ConceptsNetworking Concepts
Understanding the basics of communication systems like sender, media, receiver, etc.
Explaining the various transmission media and concept of OSI and TCP/IP protocols
Describing the concepts of LAN, WAN, wireless networks and internetworking
Detailing the different packet formats used by TCP/IP protocols and ports
Security ConceptsSecurity ConceptsSecurity ConceptsSecurity Concepts
Illustrating the principles and concepts of security
Describing the basics and techniques for identification and authentication
Explaining the various types of attack on computing resources
Detailing the concept of computer forensics for investigation and steganography for
information hiding
Security PolicySecurity PolicySecurity PolicySecurity Policy
Understanding the basics and method for defining security policies and guidelines
Defining the procedure to follow for security incidents
Security ModelsSecurity ModelsSecurity ModelsSecurity Models
Explaining the various security models like Biba , Bell-la padula, etc.
Describing the different types of access controls like mandatory or discretionary, etc.
CryptographyCryptographyCryptographyCryptography
Illustrating the evolution of cryptography and different data encryption ciphers used
Detailing the concepts and techniques for symmetric and asymmetric key
cryptography and private and public key exchange
Understanding the various techniques of secret key cryptography
Explaining the basics of message authentication, hash function, digital signature and
public key infrastructure (PKI)
Hardware SecurityHardware SecurityHardware SecurityHardware Security
Describing the concept and usage of smart card, access token and biometrics for
hardware-based security implementation
Router Hardening and ACLRouter Hardening and ACLRouter Hardening and ACLRouter Hardening and ACL
Understanding the process of routing and provisions for router security
Illustrating the steps to create and implement access control lists (ACL)
Describing the procedure to remove unwanted Protocols and Services and enable
router logging
IDSIDSIDSIDS
Explaining the concepts and types of intrusion detection systems (IDS)
Illustrating the signature detection in IDS and log analysis of IDS systems
6. Certified Network Security Professional
www.vskills.in
FirewallsFirewallsFirewallsFirewalls
Understanding the concept of firewall and various components and types of firewall
Describing the basics of firewall policy, rule sets and packet filters in firewall
Illustrating proxy server, bastion host, DMZ and honeypot used with firewall for
security management
Explaining the working of ISA Server and IPTables for Windows and Linux
Wireless SecurityWireless SecurityWireless SecurityWireless Security
Describing the basics of wireless application protocol and access point security
Explaining the usage of wireless PKI
Illustrating the various wireless security solutions and need for auditing
SSSSystem Securityystem Securityystem Securityystem Security
Detailing the techniques for desktop security by anti-virus software
Understanding Email security implementation by PGP and S/MIME
Explaining the concepts of web authentication, SSL, IPSec, TLS and SET for
implementing web security
Illustrating the basics of virtual private network (VPN), VPN types and architecture
for implementation
OS SecurityOS SecurityOS SecurityOS Security
Understanding the significance and basics of OS vulnerabilities, updates and patches
Illustrating the concept of OS integrity checks and trusted OS
Describing the techniques for OS hardening for Linux and Windows 2003
Security ManagementSecurity ManagementSecurity ManagementSecurity Management
Describing the essentials for network management and usage of SNMP for same
Explaining the procedure to manage incident response
Illustrating the process of risk management and analysis for securing assets
Understanding the concept and importance of business continuity planning and
disaster recovery for recovering from security incidents
Regulations and complianceRegulations and complianceRegulations and complianceRegulations and compliance
Explaining the relevance of laws and policies
Describing the IT Act, IPC and copyright act as applied to organization
Illustrating the concept and relevance of privacy as applied to data asset
Detailing the steps to publish and importance of email policy
7. Certified Network Security Professional
www.vskills.in
Sample QuestionsSample QuestionsSample QuestionsSample Questions
1.1.1.1. TheTheTheThe term TLS expandsterm TLS expandsterm TLS expandsterm TLS expands to ________________.to ________________.to ________________.to ________________.
A. Transport Level Security
B. Transport Layer Security
C. Transport Layer Setting
D. None of the above
2222. The. The. The. The cipher in which each letter is replaced by another letter is called _________.cipher in which each letter is replaced by another letter is called _________.cipher in which each letter is replaced by another letter is called _________.cipher in which each letter is replaced by another letter is called _________.
A. Transposition
B. Substitution
C. Hash convert
D. None of the above
3333. The. The. The. The DiffieDiffieDiffieDiffie----Hellman algorithm is used forHellman algorithm is used forHellman algorithm is used forHellman algorithm is used for ____________.____________.____________.____________.
A. Key deletion
B. Key generation
C. Key exchange
D. None of the above
4444. The. The. The. The term S/MIME refers to ____________.term S/MIME refers to ____________.term S/MIME refers to ____________.term S/MIME refers to ____________.
A. Secure/Multipurpose Internet Mail Extensions
B. Secure/Multipurpose Internet Media Extensions
C. Secure/Multipurpose Internet Multimedia Extensions
D. None of the above
5555. The. The. The. The port used by HTTPS protocol is ____________.port used by HTTPS protocol is ____________.port used by HTTPS protocol is ____________.port used by HTTPS protocol is ____________.
A. 443
B. 80
C. 21
D. None of the above
Answers: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)