Expert Advice Logo  Expert Advice

Network And System Security Professional facebook

Certificate in Network And System Security Professional (CNSSP)


 

Duration
2 MONTHS

Fee (INR)
₹ 25,000

A system administrator is a professional who is held accountable for setting up secure network, annual server maintenance such as mail servers and file servers, and much more.


Benefits

An advanced practical skill-set in assuring network security against all threats including - advanced hackers, trackers, exploit kits, Wi-Fi attacks and much more.
Discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability scanning.
You will be able to configure firewalls on all platforms including Windows, MacOS, and Linux for all types of attack scenarios.
Perform network monitoring to discover and identify potential hackers and malware using tools like Wireshark, Tcpdump, and Syslog.
Understand how we are tracked online by corporations, nation-states your ISP and others.
Understand how to best use methods of authentication including passwords, multi-factor authentication including soft tokens and hard tokens.
What are the best password managers to use and why. How passwords are cracked, and how to mitigate the password attacks.


Course Contents

    • ➥ network Footprinting
    • ➥ Network Scanning
    • ➥ Network Mapping
    • ➥ TCP Communication
    • ➥ Creating Custom Data Packets Using TCP Flags
    • ➥ Live System Scanning
    • ➥ Port Scanning
    • ➥ Scanning Beyond IDS
    • ➥ Banner Grabbing
    • ➥ Tech of Enumeration
    • ➥ Netbios Enumeration
    • ➥ Netbios Enumeration Tool: Superscan
    • ➥ Tool: Net BIOS Enumeration
    • ➥ NBT State, Super Scan
    • ➥ ID Server, Nmap, Netcat, Net Craft, CURL
    • ➥ NET Penetration Testing Using Android
    • ➥ Proxy Preparing
    • ➥ Proxy Chaining
    • ➥ Proxy Tools
    • ➥ Proxy & VPN
    • ➥ Ip Spoofing
    • ➥ Ip Spoofing Detection-Ip Identification Number
    • ➥ Ip Spoofing Detection-Direct TTL Probes
    • ➥ Ip Spoofing Counter Measures
    • ➥ Scanning Pen Testing
    • ➥ MAC Spoofing-SMAC
    • ➥ Defend Against MAC Spoofing
    • ➥ What Is Sniffer
    • ➥ Types of Sniffer:Passive Sniffer/Active Sniffer
    • ➥ Sniffer: Wireshark CACE Pilot
    • ➥ Password Sniffer: ACE
    • ➥ Employee Tracking Active Track
    • ➥ Packet Sniffer Capsa Network
    • ➥ Sniffing Prevention/ Detection Technique
    • ➥ OS, BIOS Password
    • ➥ Recovery (Windows, Linux)
    • ➥ Password Recovery And Dumping (Passcap)
    • ➥ Application Password Cracking
    • ➥ Wifi- Password Recovery
    • ➥ Strong And Unbreakable Password
    • ➥ Metasploit Basic Command Tutorial
    • ➥ Metasploit Desktop Exploit
    • ➥ Advanced Penetration Using Metasploit
    • ➥ Integrated Nessus With MT And Kali Linux
    • ➥ Autopwn Metasploit
    • ➥ Vulnerability Assessment
    • ➥ Type of Vulnerability Assessment
    • ➥ Vulnerability Research
    • ➥ Web Server Attacks
    • ➥ Website Attacks Methodology
    • ➥ Website Information Gathering
    • ➥ Web Server Footprinting
    • ➥ Mirroring a Website
    • ➥ Vulnerability Scanning
    • ➥ Web Server Security Scanner: Acunetix Scanner
    • ➥ Burp Suites Professional - Vulnerability Scanner
    • ➥ Session Hijacking
    • ➥ Hacking Web Passwords
    • ➥ Web Application Hacking
    • ➥ Web Application Threats
    • ➥ Invalidated Input
    • ➥ Parameter/ Form Temporizing
    • ➥ Directory Traversal
    • ➥ Security Misconfiguration
    • ➥ Cross Site Scripting Attacks (XSS)
    • ➥ Cross Site Request Forgery Attacks (CSRF)
    • ➥ Denial of Service Attacks in Web Application
    • ➥ Web Application Hacking Tools
    • ➥ SQL Injection Concept
    • ➥ Types of SQL Injection
    • ➥ Error Base SQL Injection
    • ➥ Blind SQL Injection
    • ➥ SQL Injection Tools (Desktop & Mobiles)
    • ➥ Wordpress Security Scanner-Wpscan
    • ➥ Cloud Computing
    • ➥ Types Of Cloud Computing Services
    • ➥ SaaS (Software as a Service)
    • ➥ LaaS (Infrastructure as a Service)
    • ➥ PaaS (Platform as a Service)
    • ➥ NaaS ( Network as a Service)
    • ➥ XaaS (Anything as a Service)
    • ➥ Social Engineering Toolkit
    • ➥ Wireless Concept
    • ➥ Wireless technologies
    • ➥ Service Set Identifier (SSID)
    • ➥ WiFi Authentication Modes
    • ➥ WiFi Chalking
    • ➥ Wireless Antenna
    • ➥ Wireless Encryption
    • ➥ WEP Encryption
    • ➥ WPA Encryption
    • ➥ WPA2 Encryption
    • ➥ Wireless Hacking Methodology
    • ➥ WiFi Discovery
    • ➥ GPS Mapping
    • ➥ Wireless Traffic Analysis
    • ➥ Launch Wireless Attack
    • ➥ Crack Wireless Encryption
    • ➥ WiFi Jammer / Signal Blocking
    • ➥ Rouge Access Point
    • ➥ Fluxion / AirGeddon WiFi Attack
    • ➥ Secure WiFi Router
    • ➥ Security For Smart phones
    • ➥ Anti Virus for Android
    • ➥ Android phones Rooting
    • ➥ Mobile Spy-Android/Iphone
    • ➥ Droid Jack-Remote Phone Hack
    • ➥ Application For Rooted And Android Phone
    • ➥ Networking Hacking Using Mobile Phone (Android)
    • ➥ Penetration Testing in Root Word
    • ➥ Latest Tools & Techniques


Eligibility

10th or Equivalent.

For Whom?

Student
IT Head
Incident response specialists
Forensic laboratory managers
Information Security professionals

Career Opportunities

Network Security Analyst
Network Security Engineer

Student Kit

  Hard page Book
  Printable Digital Copy Material
  Laptop bag
  Necessary Tool (Academic Version)
  Course Certificate