Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

IT Security Management

Time Duration – 24 Hours Number of Sessions - 12

Number of Days – 3

(Each Session is of 2 Hrs Duration)

Session 1-8: Introduction To IT Security Management

 About IT Security

 Introduction
o Secret Key Cryptography
o Public-Key Cryptography
o Hash Functions
o Why Three Encryption Techniques?
o The Significance of Key Length

 Trust Models
o PGP Web of Trust
o Kerberos
o Public Key Certificates and Certificate Authorities

 Cryptographic Algorithms In Action


o Password Protection
o Some of the Finer Details of Diffie-Hellman
o Some of the Finer Details of RSA Public-Key Cryptography
o Some of the Finer Details of DES, Breaking DES, and DES Variants
o Pretty Good Privacy (PGP)
o IP Security (IPsec) Protocol
o The SSL "Family" of Secure Transaction Protocols for the World Wide Web
o Elliptic Curve Cryptography
o The Advanced Encryption Standard and Rijndael
o Cisco's Stream Cipher

 Anti-virus

 Anti-spyware
 Browser choice

 Buffer overflow attacks

 Kerberos SSP Architecture

 Kerberos Physical Structure

 Kerberos Processes and Interactions

 SSL VPN Overview

 Options

 Advanced Features

 Wireless Security

 Types of unauthorized access

 Accidental association

 Malicious association

 Ad-hoc networks

 Non-traditional networks

 Identity theft (MAC spoofing)

 Man-in-the-middle attacks

 Denial of service

 Network injection

 Caffe Latte attack

 Counteracting risks

 Counteracting Security Risks

 MAC ID Filtering

 Static IP Addressing
 Regular WEP

 Wpav1

 Additions To Wpav1

 Tkip

 Eap

 EAP-Versions

 Leap

 Peap

 802.11i Security

 Wpav2

 Additions To Wpav2

 Wapi

 Smart Cards, USB Tokens, And Software Tokens

 RF Shielding

 Network Encryption Cracking

 Mobile Devices And Wireless IPS

 Implementing Network Encryption

 How-To: Secure A Wireless LAN

 Instrustion Detection And System Security

 IDS Terminology
o Types of Intrusion-Detection systems
o Passive system vs. reactive system
o Statistical anomaly and signature based IDSes
o Limitations
o IDS evasion techniques
o Development
 Firewalls
o Types
o Network layer and packet filters
o Application-layer
o Proxy server

 Network address translation


o Introduction
o Operating System Secrity
o Eliminate unnecessary applications and network services
o Install necessary applications: Kerberos for Windows
o Install necessary services: file sharing

 Secure Computing: Best Practices for Windows XP

 Securing a Windows XP Desktop

Session 9-10: Cyber Security Standards

 Introduction
 Means
 Manifestations
 Methods of attack
 ICMP flood
 Teardrop attack
 Peer-to-peer attacks
 Permanent denial-of-service attacks
 Application level floods
 Nuke
 Distributed attack
 Reflected attack
 Degradation-of-service attacks
 Unintentional attack
 Denial-of-Service Level II
 Blind Denial of Service
 Incidents
 Performing DoS-attacks

Session 11-12: Prevention and response

 Surviving Attacks
 Introduction
 Firewalls
 Switches
 Routers
 Application Front End Hardware
 IPS Based Prevention
 Prevention Via Proactive Testing
 Side Effects Of Dos Attacks
 Backscatter
 Denial-Of-Service Attacks And The Law
 Reported Threats
 Known Attacks
 Cyber Counterintelligence
 Proactive Cyber Defence
 Background
 Security And Systems Design
 Financial Cost
 Reasons
 Vulnerabilities
 Exploits
 Eavesdropping
 Social Engineering And Human Error
 Denial Of Service Attacks
 Indirect Attacks
 Backdoors
 Direct Access Attacks
 Reducing Vulnerabilities
 Security Measures
 Difficulty With Response

You might also like