Easy
Explanation
Home
About
Course
YouTube
Notices
NEC License Exam
Blog
News
Engineering Project
Home
About
Courses
Notice
NEC License Exam
Blog
News
INFORMATION SECURITY AND AUDIT
1. Overview of information security
Introduction To Information Security, Confidentiality, Integrity, Availability, Authentication, Non-Repudiation
Access Control
Threats, Vulnerabilities, Exploits
Risk, Risk Analysis, Risk Management Cycle
2. Information and Network Security Policies
Security Policies And Objectives
Types Of Policies: Confidentiality Policies, Integrity Policies, Hybrid Policies
Bell-Lapadula Model
Biba Integrity Model
Clark Wilson Integrity Model
Chinese Wall Model
Clinical Information Systems
Practical Exercise - Dlp And Siem Tools
3. Cryptography and PKI
Encryption - Symmetric And Asymmetric Encryption
Symmetric Key Algorithm-Des,3des
Rsa Elliptic Key Encryption
Deffie Hellman Algorithm
Session Vs Interchange Key
Hash Functions
Digital Signatures
Cryptographic Key Infrastructure
Certificates
X.509
Storing And Revoking Keys
Key Escrow
4. Network security applications
Osi Architecture Review
Authentication Applications
Ip Security
Vpn
Network Management Security
Email Security
Web Security
Ssl
Tls
Security In Mobile Devices
Security In Virtual Environments And The Cloud
5. Design Principles
Overview
Principle Of Least Privilege,
Principle Of Fail-Safe Defaults
Principle Of Economy Of Mechanism
Principle Of Complete Mediation
Principle Of Open Design
Principle Of Separation Of Privilege
Principle Of Least Common Mechanism
Principle Of Psychological Acceptabil
Compliance And Regulations
6. Compliance, Evaluation system and Law
Pci Dss
Sox
Hippa,
Evaluating Systems
Evaluating Systems, Goals Of Evaluating Systems
Tcsec
Itsec
Fips
Common Criteria
Sse-Cmm
Law And Information Security
Historical Evolution Of Computer Related Law In The Us
Privacy Law And Its Significance To Information Security
The Uk Dpa And The Eu Gdpr
Eta Of Nepal
7. Malicious logic and attacks
Malicious Logic
Trojan Horses
Viruses And Its Types
Worms
Logic Bombs
Common Attacks And Examples
Defenses
8. Vulnerability analysis and IT Audit
Introduction
Vulnerability Assessment Tools
Penetration Testing And Objectives
Black-Box, Grey-Box And White-Box Tests
Information Technology Audit
It Audit Process
Audit Report And Its Significance
Cobit
9. Intrusion detection and log analysis
Intrusion
Intrusion Detection System
Intrusion Prevention System
Log Auditing
Log Management
Incident Handling-Siem, Ueba
Log Based Intrusion Detection System
LAB WORK -ISA
1. Creating Your Own Bot Using Any Language
Implementation Of Access Control List Using Packet Tracer
Implement Encryption/Decryption Algorithm In Any Language
SOLVED PRACTICE QUESTIONS
Practice Question 1
Practice Question 2- Ids
PREV
1. PERFORM A PRACTICAL ANALYSYS ON ANY ONE DLP AND SIEM TOOLS
PREV