A Network and OS principles. 1. OSI model. 2. Network topology/network elements. 3. Network architectures. 4.
HDLC. 5. Ethernet. 6. ATM. 7. ADSL. 8.
Wireless networks. 9. TCP. 10. IP. 11. Session Protocols. 12.
Peer-to-peer protocols. 13. Routers. 14. Router Programming and ACLs. B Security devices. 1. Switches and VLANs.
2. Firewalls. 3. VPNs. 4. Proxies. 5. Application-level gateways.
6. Ring-fenced firewalls. 7. Encrypted tunnel. 8. Filtering routers. 9. Security over VPNs.
10. Firewall tools. 11. Network tools. 12. System monitoring tools. 13. Smartcards and Biometrics.
C Encryption. 1. Encryption and the OSI model. 2. Legal issues. 3. Random number generators. 4.
Cryptography. 5. Basic encryption principles. 6. Message hash. 7. Private-key methods. 8.
Public-key encryption methods. 9. Authentication. 10. Internet security. 11. AAA methods. 12.
Digital Signatures. 13. PPK. 14. Digital Certificates. 15. Protecting Private Keys. 16.
Certificate Practice Statements. 17. PKI. 18. SSH. 19. S-MIME. D System attacks.
1. Classification. 2. Intruder profiles. 3. Tools. 4. Physical layer methods.
4. Data link layer methods. 5. IP methods. 6. TCP methods. 7. Social Engineering.
8. Denial-of-service. 9. Remote Access. 10. Passwords. 11. SMTP.
12. Mail. 13. Trusted hosts. 14. Configuration/library. 15. TFTP.
16. NIS. 17. FTP. 18. NFS. 19. SNMP.
20. Wins. 21. DNS. 22. DHCP. 23. Routing protocols.
24. Viruses. 25. Worms. 26. RFCs on security. E Network Operating systems and servers. 1.
Windows domains. 2. Novell/NDS. 3. UNIX/LINUX. 4. WWW server configuration. 5.
Telnet server configuration. 6. FTP server configuration. 7. File server configuration. 8. Domain server configuration. 9.
DNS server configuration. 10. Address server configuration. 11. Email server configuration. F Security policies. 1. Risk management/assessment.
2. Auditing. 3. Finger-printing. 4. Forensic computing. 5. Distributed security policies.
6. Tiered security. 7. Secure network architecture. 8. Security assessments. 9. Fall-back systems.
10. Data recovery. 11. Cyber Terrorism. 12. Network attack scenarios. 13. Network attack case studies.
G. Mobile Networks. 1. Wireless networks. 2. GPRS/GSM/3G. 3. Location services.
4. WEP. 5. Spread spectrum. 6. Military systems. 7. Agent-based systems.
8. Mobile Agents. 9. Ad-hoc networks. 10. Routing over ad-hoc networks. 11. Transport protocols for wireless networks.
H Implementation. 1. Secure software design. 2. Intrusion Detection systems. 3. IPSec Security. 4.
Crypto Access Lists. 5. Secure Sockets. 6. Anti-replay methods. 7. Internet Key Exchange. 8.
IOS Firewalls/Context-based Access Control. 9. IOS Intrusion Detection. 10. RADIUS/ TACACS+/ Kerberos. 11. PPP/SLIP/CHAP. 12.
Java security. 13.NET security. 14.NET v. Java.