SlideShare a Scribd company logo
1 of 8
Download to read offline
Certified Network
Security Professional
VS-1082
Certified Network Security Professional
www.vskills.in
CCCCertifiedertifiedertifiedertified Network SecurityNetwork SecurityNetwork SecurityNetwork Security ProfessionalProfessionalProfessionalProfessional
Certification CodeCertification CodeCertification CodeCertification Code VS-1082
Vskills certification for Network Security Professional assesses the candidate for a
company’s network security needs. The certification tests the candidates on various areas in
network security which includes knowledge of networking, cryptography, implementation
and management of network security measures.
Why should one take this certification?Why should one take this certification?Why should one take this certification?Why should one take this certification?
This Course is intended for professionals and graduates wanting to excel in their chosen
areas. It is also well suited for those who are already working and would like to take
certification for further career progression.
Earning Vskills Network Security Professional Certification can help candidate differentiate
in today's competitive job market, broaden their employment opportunities by displaying
their advanced skills, and result in higher earning potential.
Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification?
Job seekers looking to find employment in IT or network security department of various
companies, students generally wanting to improve their skill set and make their CV
stronger and existing employees looking for a better role can prove their employers the
value of their skills through this certification
Test DetaiTest DetaiTest DetaiTest Detailslslsls
• Duration:Duration:Duration:Duration: 60 minutes
• No. of questions:No. of questions:No. of questions:No. of questions: 50
• Maximum marks:Maximum marks:Maximum marks:Maximum marks: 50, Passing marks: 25 (50%)
There is no negative marking in this module.
Fee StructureFee StructureFee StructureFee Structure
Rs. 4,500/- (Includes all taxes)
Companies that hire Vskills CertifiedCompanies that hire Vskills CertifiedCompanies that hire Vskills CertifiedCompanies that hire Vskills Certified Network SecurityNetwork SecurityNetwork SecurityNetwork Security ProfessionalProfessionalProfessionalProfessional
Network security professional are in great demand. Companies specializing in securing and
implementation of computer networks are constantly hiring knowledgeable professionals.
Various public and private companies also need network security professional for securing
and managing their computer networks.
Certified Network Security Professional
www.vskills.in
Table of ContentTable of ContentTable of ContentTable of Content
1.1.1.1. Networking ConceptsNetworking ConceptsNetworking ConceptsNetworking Concepts
1.1 Basics of Communication Systems
1.2 Transmission Media, OSI and TCP/IP stack
1.3 LAN, WAN, Wireless networks and internetworking
1.4 Packet formats and ports
2.2.2.2. Security ConceptsSecurity ConceptsSecurity ConceptsSecurity Concepts
2.1 Security principles and concepts
2.2 Identification and authentication
2.3 Attack types
2.4 Computer Forensics and steganography
3.3.3.3. Security PolicySecurity PolicySecurity PolicySecurity Policy
3.1 Security policies and guidelines
3.2 Defining incident handling procedure
4.4.4.4. Security ModelsSecurity ModelsSecurity ModelsSecurity Models
4.1 Security models (Biba , Bell-la padula, etc.)
4.2 Access controls (MAC, policy, DAC, etc.)
5.5.5.5. CryptographyCryptographyCryptographyCryptography
5.1 Evolution and data encryption methods
5.2 Symmetric and Asymmetric key Cryptography
5.3 Private and public key exchange
5.4 Secret key cryptography
5.5 Message Authentication and Hash functions
5.6 Digital Signatures and public key infrastructure
6.6.6.6. Hardware SecurityHardware SecurityHardware SecurityHardware Security
6.1 Smart card
6.2 Access token
6.3 Biometrics
7.7.7.7. Router Hardening and ACLRouter Hardening and ACLRouter Hardening and ACLRouter Hardening and ACL
7.1 Routing Process and router security
7.2 Create and implement access control lists (ACL)
7.3 Remove Unwanted Protocols and Services and router logging
8.8.8.8. IDSIDSIDSIDS
8.1 IDS concepts and types
8.2 Signature detection and log analysis
Certified Network Security Professional
www.vskills.in
9.9.9.9. FirewallsFirewallsFirewallsFirewalls
9.1 Concept, components and types
9.2 Firewall policy, rule sets and packet filters
9.3 Proxy Server, bastion host, DMZ and honeypot
9.4 ISA Server and IPTables
10.10.10.10. Wireless SecurityWireless SecurityWireless SecurityWireless Security
10.1 WAP and AP security
10.2 Wireless PKI
10.3 Wireless Security Solutions and auditing
11.11.11.11. System SecuritySystem SecuritySystem SecuritySystem Security
11.1 Desktop Security
11.2 Email security: PGP and S/MIME
11.3 Web Security: web authentication, SSL, IPSec, TLS and SET
11.4 VPN types and architecture
12.12.12.12. OS SecurityOS SecurityOS SecurityOS Security
12.1 OS Vulnerabilities, updates and patches
12.2 OS integrity checks
12.3 OS hardening (Linux and Windows 2003)
12.4 Trusted OS
13.13.13.13. Security ManagementSecurity ManagementSecurity ManagementSecurity Management
13.1 Network management and SNMP
13.2 Incident response
13.3 Risk Management
13.4 BCP and DR
14.14.14.14. Regulations and complianceRegulations and complianceRegulations and complianceRegulations and compliance
14.1 Law and policies
14.2 IT Act, IPC and copyright act
14.3 Privacy
14.4 Email policy
Certified Network Security Professional
www.vskills.in
Course OutlineCourse OutlineCourse OutlineCourse Outline
Networking ConceptsNetworking ConceptsNetworking ConceptsNetworking Concepts
Understanding the basics of communication systems like sender, media, receiver, etc.
Explaining the various transmission media and concept of OSI and TCP/IP protocols
Describing the concepts of LAN, WAN, wireless networks and internetworking
Detailing the different packet formats used by TCP/IP protocols and ports
Security ConceptsSecurity ConceptsSecurity ConceptsSecurity Concepts
Illustrating the principles and concepts of security
Describing the basics and techniques for identification and authentication
Explaining the various types of attack on computing resources
Detailing the concept of computer forensics for investigation and steganography for
information hiding
Security PolicySecurity PolicySecurity PolicySecurity Policy
Understanding the basics and method for defining security policies and guidelines
Defining the procedure to follow for security incidents
Security ModelsSecurity ModelsSecurity ModelsSecurity Models
Explaining the various security models like Biba , Bell-la padula, etc.
Describing the different types of access controls like mandatory or discretionary, etc.
CryptographyCryptographyCryptographyCryptography
Illustrating the evolution of cryptography and different data encryption ciphers used
Detailing the concepts and techniques for symmetric and asymmetric key
cryptography and private and public key exchange
Understanding the various techniques of secret key cryptography
Explaining the basics of message authentication, hash function, digital signature and
public key infrastructure (PKI)
Hardware SecurityHardware SecurityHardware SecurityHardware Security
Describing the concept and usage of smart card, access token and biometrics for
hardware-based security implementation
Router Hardening and ACLRouter Hardening and ACLRouter Hardening and ACLRouter Hardening and ACL
Understanding the process of routing and provisions for router security
Illustrating the steps to create and implement access control lists (ACL)
Describing the procedure to remove unwanted Protocols and Services and enable
router logging
IDSIDSIDSIDS
Explaining the concepts and types of intrusion detection systems (IDS)
Illustrating the signature detection in IDS and log analysis of IDS systems
Certified Network Security Professional
www.vskills.in
FirewallsFirewallsFirewallsFirewalls
Understanding the concept of firewall and various components and types of firewall
Describing the basics of firewall policy, rule sets and packet filters in firewall
Illustrating proxy server, bastion host, DMZ and honeypot used with firewall for
security management
Explaining the working of ISA Server and IPTables for Windows and Linux
Wireless SecurityWireless SecurityWireless SecurityWireless Security
Describing the basics of wireless application protocol and access point security
Explaining the usage of wireless PKI
Illustrating the various wireless security solutions and need for auditing
SSSSystem Securityystem Securityystem Securityystem Security
Detailing the techniques for desktop security by anti-virus software
Understanding Email security implementation by PGP and S/MIME
Explaining the concepts of web authentication, SSL, IPSec, TLS and SET for
implementing web security
Illustrating the basics of virtual private network (VPN), VPN types and architecture
for implementation
OS SecurityOS SecurityOS SecurityOS Security
Understanding the significance and basics of OS vulnerabilities, updates and patches
Illustrating the concept of OS integrity checks and trusted OS
Describing the techniques for OS hardening for Linux and Windows 2003
Security ManagementSecurity ManagementSecurity ManagementSecurity Management
Describing the essentials for network management and usage of SNMP for same
Explaining the procedure to manage incident response
Illustrating the process of risk management and analysis for securing assets
Understanding the concept and importance of business continuity planning and
disaster recovery for recovering from security incidents
Regulations and complianceRegulations and complianceRegulations and complianceRegulations and compliance
Explaining the relevance of laws and policies
Describing the IT Act, IPC and copyright act as applied to organization
Illustrating the concept and relevance of privacy as applied to data asset
Detailing the steps to publish and importance of email policy
Certified Network Security Professional
www.vskills.in
Sample QuestionsSample QuestionsSample QuestionsSample Questions
1.1.1.1. TheTheTheThe term TLS expandsterm TLS expandsterm TLS expandsterm TLS expands to ________________.to ________________.to ________________.to ________________.
A. Transport Level Security
B. Transport Layer Security
C. Transport Layer Setting
D. None of the above
2222. The. The. The. The cipher in which each letter is replaced by another letter is called _________.cipher in which each letter is replaced by another letter is called _________.cipher in which each letter is replaced by another letter is called _________.cipher in which each letter is replaced by another letter is called _________.
A. Transposition
B. Substitution
C. Hash convert
D. None of the above
3333. The. The. The. The DiffieDiffieDiffieDiffie----Hellman algorithm is used forHellman algorithm is used forHellman algorithm is used forHellman algorithm is used for ____________.____________.____________.____________.
A. Key deletion
B. Key generation
C. Key exchange
D. None of the above
4444. The. The. The. The term S/MIME refers to ____________.term S/MIME refers to ____________.term S/MIME refers to ____________.term S/MIME refers to ____________.
A. Secure/Multipurpose Internet Mail Extensions
B. Secure/Multipurpose Internet Media Extensions
C. Secure/Multipurpose Internet Multimedia Extensions
D. None of the above
5555. The. The. The. The port used by HTTPS protocol is ____________.port used by HTTPS protocol is ____________.port used by HTTPS protocol is ____________.port used by HTTPS protocol is ____________.
A. 443
B. 80
C. 21
D. None of the above
Answers: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)
Network Security Certification

More Related Content

What's hot

Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Network Security Projects
Network Security ProjectsNetwork Security Projects
Network Security ProjectsPhdtopiccom
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and TypesVikram Khanna
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security IssuesAfreenYousaf
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network SecurityAditiPatni3
 
Network infrastructure security management solution - A holistic approach in ...
Network infrastructure security management solution - A holistic approach in ...Network infrastructure security management solution - A holistic approach in ...
Network infrastructure security management solution - A holistic approach in ...Twinkle Sebastian
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless NetworkingGulshanAra14
 
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionHTS Hosting
 
Topics in network security
Topics in network securityTopics in network security
Topics in network securityNasir Bhutta
 
Network security
Network securityNetwork security
Network securityAli Kamil
 
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesIcs & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesomriyad
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocolsOnline
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 

What's hot (20)

Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Network Security Projects
Network Security ProjectsNetwork Security Projects
Network Security Projects
 
Network security
Network securityNetwork security
Network security
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security Issues
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Fire walls
Fire wallsFire walls
Fire walls
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Network infrastructure security management solution - A holistic approach in ...
Network infrastructure security management solution - A holistic approach in ...Network infrastructure security management solution - A holistic approach in ...
Network infrastructure security management solution - A holistic approach in ...
 
Network Security
Network SecurityNetwork Security
Network Security
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Network security
Network securityNetwork security
Network security
 
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesIcs & computer security for nuclear facilities
Ics & computer security for nuclear facilities
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 

Similar to Network Security Certification

Software Security Certification
Software Security CertificationSoftware Security Certification
Software Security CertificationVskills
 
cyber security analyst certification
cyber security analyst certificationcyber security analyst certification
cyber security analyst certificationVskills
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco Service Provider
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco Service Provider
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network DefenderITpreneurs
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Moshe Ferber
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Tech
 
Integrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsIntegrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsUlf Mattsson
 
Best CCNP (ENCOR 350 - 701) Training at NS3EDU
Best CCNP (ENCOR 350 - 701) Training at NS3EDUBest CCNP (ENCOR 350 - 701) Training at NS3EDU
Best CCNP (ENCOR 350 - 701) Training at NS3EDUNs3Edu
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 
Comp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationComp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationShivamSharma909
 
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated DesignCisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated DesignCisco Russia
 
"Exploring the Diverse World of CCNP Certifications" .pdf
"Exploring the Diverse World of CCNP Certifications"  .pdf"Exploring the Diverse World of CCNP Certifications"  .pdf
"Exploring the Diverse World of CCNP Certifications" .pdfarjunnegi34
 

Similar to Network Security Certification (20)

Software Security Certification
Software Security CertificationSoftware Security Certification
Software Security Certification
 
cyber security analyst certification
cyber security analyst certificationcyber security analyst certification
cyber security analyst certification
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
 
Integrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsIntegrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOps
 
Cloud Security Solution Overview
Cloud Security Solution OverviewCloud Security Solution Overview
Cloud Security Solution Overview
 
Ccna security
Ccna security Ccna security
Ccna security
 
Best CCNP (ENCOR 350 - 701) Training at NS3EDU
Best CCNP (ENCOR 350 - 701) Training at NS3EDUBest CCNP (ENCOR 350 - 701) Training at NS3EDU
Best CCNP (ENCOR 350 - 701) Training at NS3EDU
 
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Comp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationComp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementation
 
Ccna security
Ccna security Ccna security
Ccna security
 
Ccna security
Ccna security Ccna security
Ccna security
 
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated DesignCisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
 
"Exploring the Diverse World of CCNP Certifications" .pdf
"Exploring the Diverse World of CCNP Certifications"  .pdf"Exploring the Diverse World of CCNP Certifications"  .pdf
"Exploring the Diverse World of CCNP Certifications" .pdf
 

More from Vskills

Vskills certified administrative support professional sample material
Vskills certified administrative support professional sample materialVskills certified administrative support professional sample material
Vskills certified administrative support professional sample materialVskills
 
vskills customer service professional sample material
vskills customer service professional sample materialvskills customer service professional sample material
vskills customer service professional sample materialVskills
 
Vskills certified operations manager sample material
Vskills certified operations manager sample materialVskills certified operations manager sample material
Vskills certified operations manager sample materialVskills
 
Vskills certified six sigma yellow belt sample material
Vskills certified six sigma yellow belt sample materialVskills certified six sigma yellow belt sample material
Vskills certified six sigma yellow belt sample materialVskills
 
Vskills production and operations management sample material
Vskills production and operations management sample materialVskills production and operations management sample material
Vskills production and operations management sample materialVskills
 
vskills leadership skills professional sample material
vskills leadership skills professional sample materialvskills leadership skills professional sample material
vskills leadership skills professional sample materialVskills
 
vskills facility management expert sample material
vskills facility management expert sample materialvskills facility management expert sample material
vskills facility management expert sample materialVskills
 
Vskills international trade and forex professional sample material
Vskills international trade and forex professional sample materialVskills international trade and forex professional sample material
Vskills international trade and forex professional sample materialVskills
 
Vskills production planning and control professional sample material
Vskills production planning and control professional sample materialVskills production planning and control professional sample material
Vskills production planning and control professional sample materialVskills
 
Vskills purchasing and material management professional sample material
Vskills purchasing and material management professional sample materialVskills purchasing and material management professional sample material
Vskills purchasing and material management professional sample materialVskills
 
Vskills manufacturing technology management professional sample material
Vskills manufacturing technology management professional sample materialVskills manufacturing technology management professional sample material
Vskills manufacturing technology management professional sample materialVskills
 
certificate in agile project management sample material
certificate in agile project management sample materialcertificate in agile project management sample material
certificate in agile project management sample materialVskills
 
Vskills angular js sample material
Vskills angular js sample materialVskills angular js sample material
Vskills angular js sample materialVskills
 
Vskills c++ developer sample material
Vskills c++ developer sample materialVskills c++ developer sample material
Vskills c++ developer sample materialVskills
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample materialVskills
 
Vskills financial modelling professional sample material
Vskills financial modelling professional sample materialVskills financial modelling professional sample material
Vskills financial modelling professional sample materialVskills
 
Vskills basel iii professional sample material
Vskills basel iii professional sample materialVskills basel iii professional sample material
Vskills basel iii professional sample materialVskills
 
Vskills telecom management professional sample material
Vskills telecom management professional sample materialVskills telecom management professional sample material
Vskills telecom management professional sample materialVskills
 
Vskills retail management professional sample material
Vskills retail management professional sample materialVskills retail management professional sample material
Vskills retail management professional sample materialVskills
 
Vskills contract law analyst sample material
Vskills contract law analyst sample materialVskills contract law analyst sample material
Vskills contract law analyst sample materialVskills
 

More from Vskills (20)

Vskills certified administrative support professional sample material
Vskills certified administrative support professional sample materialVskills certified administrative support professional sample material
Vskills certified administrative support professional sample material
 
vskills customer service professional sample material
vskills customer service professional sample materialvskills customer service professional sample material
vskills customer service professional sample material
 
Vskills certified operations manager sample material
Vskills certified operations manager sample materialVskills certified operations manager sample material
Vskills certified operations manager sample material
 
Vskills certified six sigma yellow belt sample material
Vskills certified six sigma yellow belt sample materialVskills certified six sigma yellow belt sample material
Vskills certified six sigma yellow belt sample material
 
Vskills production and operations management sample material
Vskills production and operations management sample materialVskills production and operations management sample material
Vskills production and operations management sample material
 
vskills leadership skills professional sample material
vskills leadership skills professional sample materialvskills leadership skills professional sample material
vskills leadership skills professional sample material
 
vskills facility management expert sample material
vskills facility management expert sample materialvskills facility management expert sample material
vskills facility management expert sample material
 
Vskills international trade and forex professional sample material
Vskills international trade and forex professional sample materialVskills international trade and forex professional sample material
Vskills international trade and forex professional sample material
 
Vskills production planning and control professional sample material
Vskills production planning and control professional sample materialVskills production planning and control professional sample material
Vskills production planning and control professional sample material
 
Vskills purchasing and material management professional sample material
Vskills purchasing and material management professional sample materialVskills purchasing and material management professional sample material
Vskills purchasing and material management professional sample material
 
Vskills manufacturing technology management professional sample material
Vskills manufacturing technology management professional sample materialVskills manufacturing technology management professional sample material
Vskills manufacturing technology management professional sample material
 
certificate in agile project management sample material
certificate in agile project management sample materialcertificate in agile project management sample material
certificate in agile project management sample material
 
Vskills angular js sample material
Vskills angular js sample materialVskills angular js sample material
Vskills angular js sample material
 
Vskills c++ developer sample material
Vskills c++ developer sample materialVskills c++ developer sample material
Vskills c++ developer sample material
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample material
 
Vskills financial modelling professional sample material
Vskills financial modelling professional sample materialVskills financial modelling professional sample material
Vskills financial modelling professional sample material
 
Vskills basel iii professional sample material
Vskills basel iii professional sample materialVskills basel iii professional sample material
Vskills basel iii professional sample material
 
Vskills telecom management professional sample material
Vskills telecom management professional sample materialVskills telecom management professional sample material
Vskills telecom management professional sample material
 
Vskills retail management professional sample material
Vskills retail management professional sample materialVskills retail management professional sample material
Vskills retail management professional sample material
 
Vskills contract law analyst sample material
Vskills contract law analyst sample materialVskills contract law analyst sample material
Vskills contract law analyst sample material
 

Recently uploaded

ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 

Recently uploaded (20)

ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 

Network Security Certification

  • 2. Certified Network Security Professional www.vskills.in CCCCertifiedertifiedertifiedertified Network SecurityNetwork SecurityNetwork SecurityNetwork Security ProfessionalProfessionalProfessionalProfessional Certification CodeCertification CodeCertification CodeCertification Code VS-1082 Vskills certification for Network Security Professional assesses the candidate for a company’s network security needs. The certification tests the candidates on various areas in network security which includes knowledge of networking, cryptography, implementation and management of network security measures. Why should one take this certification?Why should one take this certification?Why should one take this certification?Why should one take this certification? This Course is intended for professionals and graduates wanting to excel in their chosen areas. It is also well suited for those who are already working and would like to take certification for further career progression. Earning Vskills Network Security Professional Certification can help candidate differentiate in today's competitive job market, broaden their employment opportunities by displaying their advanced skills, and result in higher earning potential. Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification? Job seekers looking to find employment in IT or network security department of various companies, students generally wanting to improve their skill set and make their CV stronger and existing employees looking for a better role can prove their employers the value of their skills through this certification Test DetaiTest DetaiTest DetaiTest Detailslslsls • Duration:Duration:Duration:Duration: 60 minutes • No. of questions:No. of questions:No. of questions:No. of questions: 50 • Maximum marks:Maximum marks:Maximum marks:Maximum marks: 50, Passing marks: 25 (50%) There is no negative marking in this module. Fee StructureFee StructureFee StructureFee Structure Rs. 4,500/- (Includes all taxes) Companies that hire Vskills CertifiedCompanies that hire Vskills CertifiedCompanies that hire Vskills CertifiedCompanies that hire Vskills Certified Network SecurityNetwork SecurityNetwork SecurityNetwork Security ProfessionalProfessionalProfessionalProfessional Network security professional are in great demand. Companies specializing in securing and implementation of computer networks are constantly hiring knowledgeable professionals. Various public and private companies also need network security professional for securing and managing their computer networks.
  • 3. Certified Network Security Professional www.vskills.in Table of ContentTable of ContentTable of ContentTable of Content 1.1.1.1. Networking ConceptsNetworking ConceptsNetworking ConceptsNetworking Concepts 1.1 Basics of Communication Systems 1.2 Transmission Media, OSI and TCP/IP stack 1.3 LAN, WAN, Wireless networks and internetworking 1.4 Packet formats and ports 2.2.2.2. Security ConceptsSecurity ConceptsSecurity ConceptsSecurity Concepts 2.1 Security principles and concepts 2.2 Identification and authentication 2.3 Attack types 2.4 Computer Forensics and steganography 3.3.3.3. Security PolicySecurity PolicySecurity PolicySecurity Policy 3.1 Security policies and guidelines 3.2 Defining incident handling procedure 4.4.4.4. Security ModelsSecurity ModelsSecurity ModelsSecurity Models 4.1 Security models (Biba , Bell-la padula, etc.) 4.2 Access controls (MAC, policy, DAC, etc.) 5.5.5.5. CryptographyCryptographyCryptographyCryptography 5.1 Evolution and data encryption methods 5.2 Symmetric and Asymmetric key Cryptography 5.3 Private and public key exchange 5.4 Secret key cryptography 5.5 Message Authentication and Hash functions 5.6 Digital Signatures and public key infrastructure 6.6.6.6. Hardware SecurityHardware SecurityHardware SecurityHardware Security 6.1 Smart card 6.2 Access token 6.3 Biometrics 7.7.7.7. Router Hardening and ACLRouter Hardening and ACLRouter Hardening and ACLRouter Hardening and ACL 7.1 Routing Process and router security 7.2 Create and implement access control lists (ACL) 7.3 Remove Unwanted Protocols and Services and router logging 8.8.8.8. IDSIDSIDSIDS 8.1 IDS concepts and types 8.2 Signature detection and log analysis
  • 4. Certified Network Security Professional www.vskills.in 9.9.9.9. FirewallsFirewallsFirewallsFirewalls 9.1 Concept, components and types 9.2 Firewall policy, rule sets and packet filters 9.3 Proxy Server, bastion host, DMZ and honeypot 9.4 ISA Server and IPTables 10.10.10.10. Wireless SecurityWireless SecurityWireless SecurityWireless Security 10.1 WAP and AP security 10.2 Wireless PKI 10.3 Wireless Security Solutions and auditing 11.11.11.11. System SecuritySystem SecuritySystem SecuritySystem Security 11.1 Desktop Security 11.2 Email security: PGP and S/MIME 11.3 Web Security: web authentication, SSL, IPSec, TLS and SET 11.4 VPN types and architecture 12.12.12.12. OS SecurityOS SecurityOS SecurityOS Security 12.1 OS Vulnerabilities, updates and patches 12.2 OS integrity checks 12.3 OS hardening (Linux and Windows 2003) 12.4 Trusted OS 13.13.13.13. Security ManagementSecurity ManagementSecurity ManagementSecurity Management 13.1 Network management and SNMP 13.2 Incident response 13.3 Risk Management 13.4 BCP and DR 14.14.14.14. Regulations and complianceRegulations and complianceRegulations and complianceRegulations and compliance 14.1 Law and policies 14.2 IT Act, IPC and copyright act 14.3 Privacy 14.4 Email policy
  • 5. Certified Network Security Professional www.vskills.in Course OutlineCourse OutlineCourse OutlineCourse Outline Networking ConceptsNetworking ConceptsNetworking ConceptsNetworking Concepts Understanding the basics of communication systems like sender, media, receiver, etc. Explaining the various transmission media and concept of OSI and TCP/IP protocols Describing the concepts of LAN, WAN, wireless networks and internetworking Detailing the different packet formats used by TCP/IP protocols and ports Security ConceptsSecurity ConceptsSecurity ConceptsSecurity Concepts Illustrating the principles and concepts of security Describing the basics and techniques for identification and authentication Explaining the various types of attack on computing resources Detailing the concept of computer forensics for investigation and steganography for information hiding Security PolicySecurity PolicySecurity PolicySecurity Policy Understanding the basics and method for defining security policies and guidelines Defining the procedure to follow for security incidents Security ModelsSecurity ModelsSecurity ModelsSecurity Models Explaining the various security models like Biba , Bell-la padula, etc. Describing the different types of access controls like mandatory or discretionary, etc. CryptographyCryptographyCryptographyCryptography Illustrating the evolution of cryptography and different data encryption ciphers used Detailing the concepts and techniques for symmetric and asymmetric key cryptography and private and public key exchange Understanding the various techniques of secret key cryptography Explaining the basics of message authentication, hash function, digital signature and public key infrastructure (PKI) Hardware SecurityHardware SecurityHardware SecurityHardware Security Describing the concept and usage of smart card, access token and biometrics for hardware-based security implementation Router Hardening and ACLRouter Hardening and ACLRouter Hardening and ACLRouter Hardening and ACL Understanding the process of routing and provisions for router security Illustrating the steps to create and implement access control lists (ACL) Describing the procedure to remove unwanted Protocols and Services and enable router logging IDSIDSIDSIDS Explaining the concepts and types of intrusion detection systems (IDS) Illustrating the signature detection in IDS and log analysis of IDS systems
  • 6. Certified Network Security Professional www.vskills.in FirewallsFirewallsFirewallsFirewalls Understanding the concept of firewall and various components and types of firewall Describing the basics of firewall policy, rule sets and packet filters in firewall Illustrating proxy server, bastion host, DMZ and honeypot used with firewall for security management Explaining the working of ISA Server and IPTables for Windows and Linux Wireless SecurityWireless SecurityWireless SecurityWireless Security Describing the basics of wireless application protocol and access point security Explaining the usage of wireless PKI Illustrating the various wireless security solutions and need for auditing SSSSystem Securityystem Securityystem Securityystem Security Detailing the techniques for desktop security by anti-virus software Understanding Email security implementation by PGP and S/MIME Explaining the concepts of web authentication, SSL, IPSec, TLS and SET for implementing web security Illustrating the basics of virtual private network (VPN), VPN types and architecture for implementation OS SecurityOS SecurityOS SecurityOS Security Understanding the significance and basics of OS vulnerabilities, updates and patches Illustrating the concept of OS integrity checks and trusted OS Describing the techniques for OS hardening for Linux and Windows 2003 Security ManagementSecurity ManagementSecurity ManagementSecurity Management Describing the essentials for network management and usage of SNMP for same Explaining the procedure to manage incident response Illustrating the process of risk management and analysis for securing assets Understanding the concept and importance of business continuity planning and disaster recovery for recovering from security incidents Regulations and complianceRegulations and complianceRegulations and complianceRegulations and compliance Explaining the relevance of laws and policies Describing the IT Act, IPC and copyright act as applied to organization Illustrating the concept and relevance of privacy as applied to data asset Detailing the steps to publish and importance of email policy
  • 7. Certified Network Security Professional www.vskills.in Sample QuestionsSample QuestionsSample QuestionsSample Questions 1.1.1.1. TheTheTheThe term TLS expandsterm TLS expandsterm TLS expandsterm TLS expands to ________________.to ________________.to ________________.to ________________. A. Transport Level Security B. Transport Layer Security C. Transport Layer Setting D. None of the above 2222. The. The. The. The cipher in which each letter is replaced by another letter is called _________.cipher in which each letter is replaced by another letter is called _________.cipher in which each letter is replaced by another letter is called _________.cipher in which each letter is replaced by another letter is called _________. A. Transposition B. Substitution C. Hash convert D. None of the above 3333. The. The. The. The DiffieDiffieDiffieDiffie----Hellman algorithm is used forHellman algorithm is used forHellman algorithm is used forHellman algorithm is used for ____________.____________.____________.____________. A. Key deletion B. Key generation C. Key exchange D. None of the above 4444. The. The. The. The term S/MIME refers to ____________.term S/MIME refers to ____________.term S/MIME refers to ____________.term S/MIME refers to ____________. A. Secure/Multipurpose Internet Mail Extensions B. Secure/Multipurpose Internet Media Extensions C. Secure/Multipurpose Internet Multimedia Extensions D. None of the above 5555. The. The. The. The port used by HTTPS protocol is ____________.port used by HTTPS protocol is ____________.port used by HTTPS protocol is ____________.port used by HTTPS protocol is ____________. A. 443 B. 80 C. 21 D. None of the above Answers: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)