K-Secure
Copyright © 2008 Ksecure.net
All Rights reserved
E-Mail: webmaster@ksecure.net
Designed by  Neville Bulsara
Did you know that...
Organizations that have availed of K-Secure's IT Security Training programs and services include leading corporates from Mumbai and the rest of India and include GE Capital, Patni Computers, HSBC, TCS, Great Eastern Shipping,  Indiabulls, Tata AIG...
K-Secure
Information Security Training & Services
Information Security Training & Services
Complete Enterprise Protection
K-Secure CEP - Complete Enterprise Protection Training Course

Giving participants a complete overview of the tasks and issues involved in protecting an organizationís network and effectively managing security,
K-Secure's CEP - Complete Enterprise Protection  Training Program - is designed for senior management, security managers and administrators.

Beginning with the basics of networking, participants will go on to understand how attackers can exploit the vulnerabilities in their systems. This is followed by topics related to securing one's systems from such attacks using various technologies.

One of the key highlights of the Complete Enterprise Protection Training Program is the great emphasis laid on developing the necessary skills needed to make meaningful sense out of the various logs generated by the many security tools that may be deployed in the enterprise. Without this knowledge - and methodologies of Incident Handling, and post-incident Forensic Analysis of systems that have been probed and / or compromised - any talk of securing one's enterprise is just that -- talk with no tangible action.

Our Training Calendar lists scheduled Complete Enterprise Protection Training Programs in Mumbai & other parts of India.

Location : Our Complete Enterprise Protection Training Program is conducted at our state-of-the-art Training Lab in Mumbai - India. We can also - on request - conduct this training on-site at customer locations throughout India in locations including  Delhi, Bangalore, Chennai, Hyderabad, Pune etc.

Duration : 3 days

Who should attend :The Complete Enterprise Protection Training Program  is designed for Security managers or information security management professionals and security administrators.


Prerequisites : Participants of the Complete Enterprise Protection Training Program are required to have a working knowledge of TCP/IP and general networking concepts, hardware and operating system.

Topics Covered :
Did you know that...
• Certified Ethical Hackers are a valuable asset to an organization that wishes to test - and secure - their networks against the increasing  threats from the Internet.

• One of the best ways to test your organization's security is to recruit the services of a Certified Ethical Hacker to try and penetrate your systems - it may leave you a little bit red in the face to discover that your systems aren't as secure as you thought they were, but that's far better than having a malicious hacker sneak in and cripple your networks or steal your data!
For further details about our Complete Enterprise Protection training programs in Mumbai and other parts of India, please contact us
Networking & TCP/IP - refresher on basic networking technologies and the TCP/IP protocol.
Types of Attacks - security fundamentals, system vulnerabilities and various forms of attacks that exploit them including SQL Injection, Buffer Overflows, Cross Site Scripting, Dos / DDos Attacks, Worms & Trojans.
Security Technoligies - an insight into the various technologies used to prevent and detect security breaches including Firewalls, Intrusion Detection Systems (IDSs), Authentication, Malicious Code Control, Encryption Technologies.
System Logs Analysis
Preparing for Incident Response - an insight into the discipline of handling situations in a cost effetice and efficient manner, requisites for Incidence Response and how to go about forming an Incidence Response Team & training it.
Introduction to Computer & Network Forensics - the science of extracting information from a potentially probed and / or compromised system in order to determine the extent of damage done, trace the perpetrator of the crime and recover information that can positively stand test in a court of law.
This space deliberately left blank...



... like the gaping hole left in the security of  enterprises who don't realize the importance of  Log Analysis & Incident Response Mechanisms!
About K-Secure
Training Programs
Training Calendar
IT Security Services
Contact
Quick Training Links:
Scheduled Programs:
Testing Services
 
Blog
Trainers
Home
checkpoint training mumbai india check point training checkpoint authorized training center
ec council training partner
pearson vue authorised test centre
Home | About | Training Programs | Training Calendar | IT Security Services | Testing Services
Trainers | BlogContact us