techinaut insturctor
TECHINAUT

B LEVEL

4.5 (15)
NIELIT

Network Management & Information Security

B5.3-R4- B level (NIELIT)

This course explores how computer networks work and how to manage and secure them. Students will learn about standards, technologies, tools, and industry best practices.

Network Management & Information Security

10 Lessons

Network Management & Information Security

120 Hours - (Theory: 48 hrs + Practical: 72 hrs)

Network Management & Information Security

100+ students enrolled

Overview
Course Description

The information stored on these networks is also subject to various security threats inside and outside the organization. This course explores securing data stored on these networks and identifying and preventing unauthorized access.The Associate of Applied Science (AAS) degree in Network Management & Information Security is a two-year program that prepares students for an entry-level position in the field.

What you'll learn
  • This course is designed to give students a broad overview of network security and management.
  • The course cover various topics, from the ethical and legal issues surrounding the subject to the practical aspects of securing networks and systems.
  • The course also examines the different methods and procedures used in the industry to protect information systems.
  • The course will focus on computer networks, including information security, hardware components, and networking security.
  • How to install and maintain computer systems and troubleshoot problems.
  • It covers network infrastructure, password management, and disaster recovery.
Course Content
  • Introduction to Information SecurityLecture 1.1 Attributes of Information Security

    Introduction to Information Security 02:53
  • Introduction to Information SecurityLecture 1.2 Threats & Vulnerabilities

    Introduction to Information Security 02:53
  • Introduction to Information SecurityLecture 1.3 Security Mechanisms

    Introduction to Information Security 02:53
  • Identification & Entity AuthenticationLecture 2.1 Definitions, Types of authentication

    Identification & Entity Authentication 02:53
  • Identification & Entity AuthenticationLecture 2.2 Password Vulnerabilities & Attacks

    Identification & Entity Authentication 02:53
  • Identification & Entity AuthenticationLecture 2.3 Password Policy & Discipline

    Identification & Entity Authentication 02:53
  • Security Policy DesignLecture 3.1 Definition: Security Policy, Best practices in security Policy

    Security Policy Design 02:53
  • Security Policy DesignLecture 3.2 Risk Management

    Security Policy Design 02:53
  • Security Policy DesignLecture 3.3 Incident Handling

    Security Policy Design 02:53
  • CryptographyLecture 4.1 Cryptography Basics

    Cryptography 02:53
  • CryptographyLecture 4.2 Conventional Symmetric Encryption Algorithms

    Cryptography 02:53
  • Infrastructure & Message AuthenticationLecture 5.1 Public Key Cryptography Principles & Applications

    Infrastructure & Message Authentication 02:53
  • Infrastructure & Message AuthenticationLecture 5.2 Algorithms, One way Hash Functions

    Infrastructure & Message Authentication 02:53
  • Infrastructure & Message AuthenticationLecture 5.3 Digital Signatures, Public Key Infrastructure (PKI)

    Infrastructure & Message Authentication 02:53
  • Network SecurityLecture 6.1 Overview of IPV4

    Network Security 02:53
  • Network SecurityLecture 6.2 Network Attacks

    Network Security 02:53
  • Network SecurityLecture 6.3 IPSEC

    Network Security 02:53
  • Network ManagementLecture 7.1 Network Management Architecture & Applications

    Network Management 02:53
  • Network ManagementLecture 7.2 Network Management Functions – Configuration

    Network Management 02:53
  • Network ManagementLecture 7.3 Network Management Functions

    Network Management 02:53
  • Network ManagementLecture 7.4 SNMP v1, SNMP, v3

    Network Management 02:53
  • Network ManagementLecture 7.5 Network Management Accounting & Performance Functions

    Network Management 02:53
  • Web Security & Application SecurityLecture 8.1 Web security Consideration

    Web Security & Application Security 02:53
  • Web Security & Application SecurityLecture 8.2 Secured Socket Layer and Transport layer security

    Web Security & Application Security 02:53
  • Web Security & Application SecurityLecture 8.3 Secured Electronic Transaction, Secured Mail

    Web Security & Application Security 02:53
  • FirewallsLecture 9.1 Firewall Design Principles

    Firewalls 02:53
  • FirewallsLecture 9.2 Types of Firewalls

    Firewalls 02:53
  • FirewallsLecture 9.3 Firewall Configuration

    Firewalls 02:53
  • Cyber Crime and Cyber lawLecture 10.1 Cyber crimes

    Cyber Crime and Cyber law 02:53
  • Cyber Crime and Cyber lawLecture 10.2 Indian IT Act 2000

    Cyber Crime and Cyber law 02:53
About Us
techinaut profile
TECHINAUT

B LEVEL

4.5 Instructor Rating
techinaut

100+ Courses

techinaut

20+ Faculty

techinaut

Industry Expert

techinaut

45000+ students enrolled

UI/UX Designer, with 7+ Years Experience. Guarantee of High Quality Work.

Skills: Web Design, UI Design, UX/UI Design, Mobile Design, User Interface Design, Sketch, Photoshop, GUI, Html, Css, Grid Systems, Typography, Minimal, Template, English, Bootstrap, Responsive Web Design, Pixel Perfect, Graphic Design, Corporate, Creative, Flat, Luxury and much more.

Available for:

  • 1. Full Time Office Work
  • 2. Remote Work
  • 3. Freelance
  • 4. Contract
  • 5. Worldwide
Reviews
techinaut
Nicole Brown

UX/UI Designer

4.5 Instructor Rating

“ This is the second Photoshop course I have completed with Cristian. Worth every penny and recommend it highly. To get the most out of this course, its best to to take the Beginner to Advanced course first. The sound and video quality is of a good standard. Thank you Cristian. “

Reply
Post A comment