|Course or Certification Name||Category||Location||Mode of learning|
|IINS 2.0: Implementing Cisco IOS Network Security||Cisco Security Certifications||Online self study|
|The Complete Cyber Security Course : Network Security!||Online self study|
|Cisco Core Security: Network Security Fundamentals||Online self study|
|Communications and Network Security||Online self study|
|Network Security Basics||Online self study|
|Vskills Certified Network Security Professional||Routing & Network Support||Online self study|
|The Complete Cyber Security Course: Network Security||Online self study|
|Certified Information Systems Security Professional (CISSP) - Online Self Paced||Cloud Computing||Online self study|
|VMware Certified Professional 6 - Network Virtualization (VCP6-NV)||Virtualization||Online self study|
|Vskills Certified Network Security Open source Software Developer Government Certification||Network Security||Offline self study|
|Network Security Administration||CCNP||Noida , Delhi , Gurgaon , Chandigarh , Bangalore , Hyderabad , Chennai , Ernakulam||Online Classroom|
|Certified Network Defender Certification||Online self study|
|Network Security by RIT||Online self study|
|Microsoft Azure cloud - Beginner Bootcamp (Updated Sep 2019)||Online self study|
|Information Security: Context and Introduction||Online self study|
Designed to be as efficient as classroom training, Cisco IOS Network Security makes it significant for business to focus on the security of the networks. It is also challenging due to increased availability requirements and regulatory requirements. While organizations move their business to the public sector, they have to make certain that the data doesn’t come in front of wrong individuals. The course covers the development of a comprehensive security and different phases of the process and significance of a sound security policy.
Become a cyber security specialist. After this course, you will be able to discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability scanning . You will be able to architect your network for maximum security and prevent local and remote attacks. We also cover the use of custom router firmware to provide you with better network security services. You will understand the various types of firewalls that are available and what threats each help mitigate. Including layer 4 firewalls like Iptables on Linux and PF on MacOS and BSD. Virtual firewalls, host-based firewalls and application based firewalls like Pfsence. We cover firewalls on all platforms including Windows, Mac OS X and Linux for all types of use scenarios. We explore in detail wireless security, the configurations that are required for maximum security and why. How Wi-Fi is hacked and how to mitigate those attacks. Covering everything from encryption weaknesses to evil twins, RF isolation, and Wi-Fi crackers. You will master network monitoring to discover and identify potential hackers , malware and other adversaries that might be lurking on your network. Using tools like Wireshark , Tcpdump and Syslog. We then move away from network security and onto the details of how we are tracked online by corporations, nation-states your ISP and others. You will understand the techniques used like zombie super cookies, browser fingerprinting and how browser profiling works so third parties can establish who you are online. We look at search engine privacy - and how to mitigate the tracking and privacy issues of search engines and their associated services. Browser security - We cover one of the largest risks online, the browser. The doorway into your system. How to best reduce the attack surface of the browser and harden it for maximum security and privacy. A critical consideration for reducing your risk. Finally you will fully understand how to best use methods of authentication including passwords and multi-factor authentication - soft tokens and hard tokens . The best password managers to use and why. How passwords are cracked, and how to mitigate the cracking. This is volume 2 of 4 of your complete guide to cyber security privacy and anonymity.
Not knowing how to properly deploy and secure different Cisco Firewalls, Intrusion Prevention Systems, or networking devices can leave your network inefficient and vulnerable to attack. In this course, Cisco Core Security: Network Security Fundamentals, you will learn the foundational knowledge of deploying Cisco’s security products effectively, and how to properly securing each plane. First, you will learn how to leverage Cisco’s Validated Designs to properly architect your network. Next, you will learn how to leverage NetFlow to validate the data traversing your network. Finally, you will explore how to secure the management plane and implement control and data plane hardening techniques on Cisco Routers, Switches, and Wireless LAN Controllers. When you are finished with this course, you will have the skills and knowledge of designing and hardening Cisco security devices needed to produce efficient networks that are secure.
Network communication is one of the primary areas of risk to most business processes. Networks provide the attack surface used to compromise data and business operations. In this course, Communications and Network Security, you will learn about network and communications models such as OSI and TCP/IP. Next, you'll touch on the area of secure protocols. Finally, you will explore network attacks. When you're finished with this course, you will have a good understanding of network and communications security, protocols, and network encryption needed to help you audit, operate, and manage secure communications.
Data breaches have become common place in national and world news, and because of this, engineers now find themselves in new roles in organizations, exclusively focused on securing information. In this course, Network Security Fundamentals, you will learn about the different types of attacks used to bring down networks, and/or steal data from them. First, you will examine the physical security of data centers, password creation recommendations, user account privileges, and devices to monitor network behavior. Next, you will learn about techniques for mitigating these attacks. Finally, you will learn about mechanisms for encrypting wireless traffic. By the end of this course, you will know the difference between WEP, WPA, WPA2, and how you can use multifactor authentication to prevent unauthorized account access.
Vskills certification for Network Security Professional assesses the candidate for a company’s network security needs. The certification tests the candidates on various areas in network security which includes knowledge of networking, cryptography, implementation and management of network security measures.
After this course, you will be able to discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability scanning. You will be able to architect your network for maximum security and prevent local and remote attacks. We also cover the use of custom router firmware to provide you with better network security services. You will understand the various types of firewalls that are available and what threats each help mitigate.
Certified Information Systems Security Professional (CISSP) is an information security certification that was developed by the International Information System Security Certification Consortium, also known as (ISC)2. This CISSP course was prepared by professional experts and has carefully-designed modules that offer comprehensive learning content covering all the topics that will help candidates in the preparation for the CISSP exam. Offering unlimited online content access for six months, the course will help candidates gain expertise in areas like security principles, security engineering, asset management and network security as per an organisation’s requirements.
VMware, a subsidiary of Dell Technologies, provides cloud and virtualisation software and services. VMware Certified Professional tests the skills related to installing, configuring, or maintaining VMware technologies.| This VMware Certified Professional 6 Network Virtualization (VCP6-NV) course imparts the knowledge and skills to install, configure, and administer NSX virtual networking implementations, regardless of the underlying physical architecture | The course offers a comprehensive coverage on topics like installing and upgrading, configuring and maintaining NSX virtual networks, security, physical infrastructure requirements, and other related areas | The course is aligned with the VCP6-NV exam syllabus and a course completion certification is awarded to the candidates
There are numerous open source network security software development tools. This Vskills Certified Network Security Open source Software Developer course will provide the necessary training to the candidates as per the company need for network security software development. It is a government-certified course and offers knowledge on various tools related to software development of network security.
Network Security Administration course trains you in ensuring that a network is secured from any internal or external security threats and incidents. With this course, you will be prepared to keep an organization's network safe, up-to-date and running smoothly.
Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on a job-task analysis and cybersecurity education framework presented by the National Initiative of Cybersecurity Education (NICE). The course has also been mapped to global job roles and responsibilities and the Department of Defense (DoD) job roles for system/network administrators. The course is designed and developed after extensive market research and surveys. | The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations. The study-kit provides you with over 10 GB of network security best practices, assessments and protection tools. The kit also contains templates for various network policies and a large number of white papers for additional learning.
In this course, you will examine the various areas of network security including intrusion detection, evidence collection and defense against cyber attacks. The issues and facilities available to both the intruder and data network administrator will also be examined to illustrate their effect.
A course with 12 sections with each section dedicated to Azure overview, storage, network, compute, App services, databases, Analytics, IoT, Integration, Security, Monitoring and Infrastructure as code (ARM Templates), Azure DevOps. V2.6 09/2019: A new section with lectures on Azure DevOps & Azure Infrastructure as code (ARM Templates) has been added. See the latest reviews we got at the bottom of the page. Microsoft Azure is the fastest growing cloud platform in the world. This course is designed to help you to build strong foundation in Microsoft Azure. No prior Azure experience required. This course has been designed with an architectural approach. In the first overview section of the course, I will introduce you to inner workings of Azure and take you through all key azure services at high level. Once overview is completed, we will deep dive into following layers of Azure service areas with several hands lab demonstrations. Storage - Introduction to Azure storage services architecture; Storage account & Blob storage configuration using Azure portal; introduction to Azure file share and how to mount file share on a VM; Introduction to Azure tables, queues and disk storage; five layers of Azure storage security; Storage monitoring using Azure portal. Network - Introduction of Azure network architecture; Creation of Virtual network, Network security groups, NIC, UDR; Associate two NIC's to VM; Introduction to Azure High Availability solutions; Availability sets and Availability Zones; Introduction to load balancer and creation of LB in Azure; Introduction to VPN gateway and different connectivity options; Carry out peering of Virtual networks. Compute - Introduction to compute building blocks; Virtual machine creation, storage, availability sets, VM scale sets & auto scaling; Taking backup of VM and security and monitoring of Virtual machines; Cloud service creation; Service fabric cluster creation. App services - Introduction to Azure app services building blocks; Creating and managing web apps, mobile apps, API apps; Auto scaling of app services; Securing and monitoring of App services; High level overview of Azure notification hub, mobile engagement, Content delivery network, media services and Azure search. Databases - Introduction to Azure database services building blocks; Creating and managing Azure SQL database; Configuration of firewall rules, Azure active directory admin, Active Geo replication; Overview of SQL managed instance; Walkthrough of five layers of security; Azure SQL database monitoring; Overview & creation of COSMOS database; Overview and creation of Azure data factory; Overview of SQL stretch and SQL data warehouse. Deliver Big Data Solution on Azure - Introduction to Azure Analytics services; Introduction to Data Lake Store; Creation of Data Lake Store; Migrate the data from SQL Database into Data Lake store using Data Factory; Introduction to Azure HDInsight; Process the data in blob storage using Azure HDInsight hive query; Introduction to Data Bricks; Use Data Bricks to process data from data lake store; Migrate data into SQL Data warehouse using data factory; Introduction to Power BI, Data Explorer and Data Catalog and lab demos on how to create and manage them. Deliver Application Integration on Azure - Introduction to Azure Integration services; Introduction to Azure Logic Apps; Creation of Logic app to process incoming JSON message; Introduction to Azure functions; Create an Azure function and trigger from logic app; Introduction to Azure service bus; Create service bus queue and insert message into service bus from logic app; Introduction to on-premise data gateway; Access file system in Azure VM from logic app via data gateway; Introduction to Enterprise Integration pack; Develop logic app and validate XML using integration account ; Introduction to Event Grid. Internet of things (IoT) - Walkthrough of IoT Building blocks; Introduction to Event Hub; Creation of Event Hub and post events; Introduction to IoT Hub; Creation of IoT Hub and apply device configuration to devices; Send messages into IoT Hub using simulated device; Overview of IoT Hub communication; Configure message routing in IoT hub; Introduction to Stream Analytics; End to end event flow from simulated device to Power BI; Trigger an Azure function from Stream Analytics; Overview of Azure IoT Edge, Device provisioning services, IoT Central, IoT Solution accelerators; Introduction to Azure Time series Insights; View event data using Azure Time series insights explorer. Security - Introduction to Azure security related services; Introduction to Azure active directory and configure user settings. Introduction to Role Based Access Control; Creation of custom roles and dynamic groups; Introduction to conditional based access policies and implement location based conditional access policy; Introduction to Azure policies and implement them; Introduction to Security Centre and implement preventive measures; Introduction to Azure Key vault and access secret securely from Azure web app. Monitoring & Diagnostics - Introduction to Azure Monitoring & Diagnostic services, Azure monitor, Activity logs, metrics, Alerts and Autoscale; Monitor metrics and configure activity log alert using Azure monitor. Introduction to Azure monitor logs; configure data sources, view logs, configure log search alerts and import different monitoring solution; , Introduction to Application Insights and monitor apps using application map, smart detection and live metric stream. Azure infrastructure as code (ARM Templates) - Introduction to ARM templates; Generate ARM templates from existing deployment; Create ARM templates using visual studio; Refer to keys in Vault; Use custom images; Use incremental mode; Nested templates; Subscription level deployments Azure DevOps - Introduction to Azure DevOps; Walkthrough of Azure DevOps portal; Introduction to Azure Repos and publish both infrastructure as code and application code; Configure branches, branch security and policies; Introduction to Azure pipelines; Configure build and release pipeline to deploy both infrastructure and application on top of the infrastructure; Walk-through of key pipeline settings This course contains both theory lectures ( slides are attached to download for reference) and a significant number of hands-on demos that helps you in gaining hands-on experience in key Azure services. This course help you in laying strong basic foundation in preparation of Microsoft Azure certifications. Microsoft Azure is a constantly evolving platform and I will be keep close watch on Azure announcements and add new demos wherever possible. So, start taking this course and put yourself in high demand in the world of IT and command higher salary!!! Some of the reviews we got in the last one month: " I have gone through first few sections of the course & they are in detail, gives lot of clarity and confidence that you are learning all that you need to know. Best value for money and knowledge gained is incomparable " "The course is very comprehensive. It goes into details in every section of Azure. I highly recommend it to anyone who wants to learn about Microsoft Azure." "detailed explanation on Azure, very good for beginners!! " "Well explained and great content which covers most part of azure. " "One of the best course for Azure , i am learning for Az-103, the trainer has in depth knowledge ".
In this course you will explore information security through some introductory material and gain an appreciation of the scope and context around the subject. This includes a brief introduction to cryptography, security management and network and computer security that allows you to begin the journey into the study of information security and develop your appreciation of some key information security concepts. The course concludes with a discussion around a simple model of the information security industry and explores skills, knowledge and roles so that you can determine and analyse potential career opportunities in this developing profession and consider how you may need to develop personally to attain your career goals.