Security Infrastructure Specialist

Gate all update news here

Security Infrastructure Specialist

Security Infrastructure Specialist is a 30 hours comprehensive program offered by ICSS. Students will learn about various important concepts about IT Security Infrastructure; various components of Cyber Security Infrastructure; Security Architecture; Vulnerability Assessment; Penetration Testing; Threat Modeling; Important Security Mechanisms; Cryptography; Application Filtering; Content Filtering; Security Information and Event Management (SIEM); Installation and Usage of Open-Source Endian Firewall; Organizational Security Posture Evaluation and Various Strategies; Fundamentals of Cyber Security Measures; Vulnerability Management and Legal Compliance; Threat and Vulnerabilities Mitigation Techniques and many more. After completion of this course, you will be able to handle the entire IT infrastructure in an effective and efficient way. The students will also get hands-on lab experience using various opensource tools.

Security Infrastructure Specialist Course Modules

    M 1 – Introduction to IT Security Infrastructure
  • 1.1 : Meaning and Definition of IT Security Infrastructure
  • 1.2 : Need of IT Security Infrastructure
  • 1.3 : Important components of IT Security Infrastructure
  • 1.4 : IT Security Architecture
  • M 2 – Cyber Security Infrastructure Components
  • 2.1 : Overview of Cyber Security Infrastructure Components
  • 2.2 : IT infrastructure and IT Assets
  • 2.3 : Network Environment
  • M 3 – Security Architecture
  • 3.1 : Overview of Security Architecture
  • 3.2 : Importance of Security Architecture
  • 3.3 : Components of Security Architecture
  • 3.4 : Fundamental attributes of security architecture
  • 3.5 : Phases of the Security Architecture Process
  • 3.6 : Build a Strong Security Architecture Framework
  • M 4 – Vulnerability Assessment
  • 4.1 : Vulnerability Assessment
  • 4.2 : Importance of vulnerability assessment
  • 4.3 : Vulnerability classification
  • 4.4 : Vulnerability assessment steps
  • 4.5 : Types of vulnerability assessment techniques
  • 4.6 : Vulnerability assessment phases
  • 4.7 : System security vulnerability
  • 4.8 : Device hardening
  • 4.9 : Minimum baseline security standards
  • M 5 – Penetration Testing
  • 5.1 : Overview Penetration Testing
  • 5.2 : Need of Penetration Testing
  • 5.3 : Various Types of Penetration Testing
  • 5.4 : Advantages of Penetration Testing
  • 5.5 : Difference between vulnerability assessment and penetration testing
  • M 6 – Threat Modeling
  • 6.1 : Overview of Threat Modeling
  • 6.2 : Importance of Threat Modeling
  • 6.3 : Creating a threat model
  • 6.4 : Important Threat Modeling Steps
  • M 7 – . Important Security Mechanisms
  • 7.1 : Internet Protocol Security (IPsec)
  • 7.2 : Modes of IPSec
  • 7.3 : IPsec with encryption
  • 7.4 : IPSec operations
  • 7.5 : IPSec scenarios
  • M 8 – Cryptography
  • 8.1 : Objectives of cryptography
  • 8.2 : Encryption and Decryption
  • 8.3 : Types of cryptographic functions
  • 8.4 : Cryptography types
  • 8.5 : Cryptography - PKI
  • 8.6 : Ensuring Regulatory Compliance
  • 8.7 : Industry Best Practices
  • M 9 – Application Filtering
  • 9.1 : Overview of Application Filtering
  • 9.2 : Application Filtering
  • 9.3 : Different types of application filters
  • 9.4 : Current challenges of Application Filtering
  • 9.5 : Different Types of Controls
  • M 10 – Content Filtering
  • 10.1 : Overview of Content Filtering
  • 10.2 : Meaning and Definition of Content Filtering
  • 10.3 : Importance of Content filtering
  • 10.4 : Working of Content Filtering
  • M 11 – Security Information and Event Management (SIEM)
  • 11.1 : Overview of SIEM
  • 11.2 : Formation of SIEM
  • 11.3 : Security Event Management (SEM)
  • 11.4 : Security Information Management (SIM)
  • 11.5 : Need of SIEM
  • 11.6 : SIEM Tool deployment and configuration
  • 11.7 : Objectives of a SIEM deployment
  • 11.8 : SIEM deployment phases
  • 11.9: Discovery phase
  • M 12 – Installation and Usage of Open-Source Endian Firewall
  • 12.1 : Overview
  • 12.2 : Hardware and software requirements
  • 12.3 : Hardware requirements
  • 12.4 : Software requirements
  • 12.5 : Installation of Endian Firewall
  • 12.6 : Endian firewall exercises
  • M 13 – Organizational Security Posture Evaluation and Various Strategies
  • 13.1 : Introduction to Gap Assessment
  • 13.2 : Overview of Gap Assessment
  • 13.3 : GAP assessment testing
  • 13.4 : Internal Audit
  • 13.5 : External Audit
  • M 14 – Fundamentals of Cyber Security Measures
  • 14.1 : Synopsis of operational and technical cyber security measures
  • 14.2 : Risk assessment
  • 14.3 : Patch management
  • 14.4 : Change management
  • 14.5 : Configuration management
  • M 15 – Vulnerability Management and Legal Compliance
  • 15.1 : Threat & vulnerability management
  • 15.2 : Incident response management
  • 15.3 : Event & log monitoring
  • 15.4 : System integrity check
  • 15.5 : Policy compliance
  • M 16 – Threat and Vulnerabilities Mitigation Techniques
  • 16.1 : Overview of Threat and Vulnerabilities Mitigation Techniques
  • 16.2 : Training and awareness
  • 16.3 : Governance, Risk and Compliance (GRC)
  • 16.4 : Important Security foundations

BOOK YOUR DEMO NOW

What are you waiting for?

Pick up your phone & register your seat for Cyber Security & Ethical Hacking Training & Certification courses. If you still have any kind of doubts feel free to contact our counselor.

Program Details​

  • Identify common infrastructure vulnerabilities and mitigation techniques
  • Describe the layers of infrastructure security and components at each layer
  • Articulate the application of common security models across the enterprise
  • Know basics of enterprise compliance frameworks
  • Understand the impact of cybersecurity threats and the importance of critical infrastructure protection
  • Apply national cybersecurity strategies frameworks
  • Identify different critical infrastructures and its vulnerabilities as well as threat mitigation techniques
  • Apply these cybersecurity concepts in the context of various applications such as smart grid, smart city and for Industry

Copyright © 2022 by ICSS. All Rights Reserved.