SlideShare a Scribd company logo
1 of 8
Download to read offline
Certified Network
Security Professional
VS-1082
Certified Network Security Professional
www.vskills.in
CCCCertifiedertifiedertifiedertified Network SecurityNetwork SecurityNetwork SecurityNetwork Security ProfessionalProfessionalProfessionalProfessional
Certification CodeCertification CodeCertification CodeCertification Code VS-1082
Vskills certification for Network Security Professional assesses the candidate for a
company’s network security needs. The certification tests the candidates on various areas in
network security which includes knowledge of networking, cryptography, implementation
and management of network security measures.
Why should one take this certification?Why should one take this certification?Why should one take this certification?Why should one take this certification?
This Course is intended for professionals and graduates wanting to excel in their chosen
areas. It is also well suited for those who are already working and would like to take
certification for further career progression.
Earning Vskills Network Security Professional Certification can help candidate differentiate
in today's competitive job market, broaden their employment opportunities by displaying
their advanced skills, and result in higher earning potential.
Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification?
Job seekers looking to find employment in IT or network security department of various
companies, students generally wanting to improve their skill set and make their CV
stronger and existing employees looking for a better role can prove their employers the
value of their skills through this certification
Test DetaiTest DetaiTest DetaiTest Detailslslsls
• Duration:Duration:Duration:Duration: 60 minutes
• No. of questions:No. of questions:No. of questions:No. of questions: 50
• Maximum marks:Maximum marks:Maximum marks:Maximum marks: 50, Passing marks: 25 (50%)
There is no negative marking in this module.
Fee StructureFee StructureFee StructureFee Structure
Rs. 4,500/- (Includes all taxes)
Companies that hire Vskills CertifiedCompanies that hire Vskills CertifiedCompanies that hire Vskills CertifiedCompanies that hire Vskills Certified Network SecurityNetwork SecurityNetwork SecurityNetwork Security ProfessionalProfessionalProfessionalProfessional
Network security professional are in great demand. Companies specializing in securing and
implementation of computer networks are constantly hiring knowledgeable professionals.
Various public and private companies also need network security professional for securing
and managing their computer networks.
Certified Network Security Professional
www.vskills.in
Table of ContentTable of ContentTable of ContentTable of Content
1.1.1.1. Networking ConceptsNetworking ConceptsNetworking ConceptsNetworking Concepts
1.1 Basics of Communication Systems
1.2 Transmission Media, OSI and TCP/IP stack
1.3 LAN, WAN, Wireless networks and internetworking
1.4 Packet formats and ports
2.2.2.2. Security ConceptsSecurity ConceptsSecurity ConceptsSecurity Concepts
2.1 Security principles and concepts
2.2 Identification and authentication
2.3 Attack types
2.4 Computer Forensics and steganography
3.3.3.3. Security PolicySecurity PolicySecurity PolicySecurity Policy
3.1 Security policies and guidelines
3.2 Defining incident handling procedure
4.4.4.4. Security ModelsSecurity ModelsSecurity ModelsSecurity Models
4.1 Security models (Biba , Bell-la padula, etc.)
4.2 Access controls (MAC, policy, DAC, etc.)
5.5.5.5. CryptographyCryptographyCryptographyCryptography
5.1 Evolution and data encryption methods
5.2 Symmetric and Asymmetric key Cryptography
5.3 Private and public key exchange
5.4 Secret key cryptography
5.5 Message Authentication and Hash functions
5.6 Digital Signatures and public key infrastructure
6.6.6.6. Hardware SecurityHardware SecurityHardware SecurityHardware Security
6.1 Smart card
6.2 Access token
6.3 Biometrics
7.7.7.7. Router Hardening and ACLRouter Hardening and ACLRouter Hardening and ACLRouter Hardening and ACL
7.1 Routing Process and router security
7.2 Create and implement access control lists (ACL)
7.3 Remove Unwanted Protocols and Services and router logging
8.8.8.8. IDSIDSIDSIDS
8.1 IDS concepts and types
8.2 Signature detection and log analysis
Certified Network Security Professional
www.vskills.in
9.9.9.9. FirewallsFirewallsFirewallsFirewalls
9.1 Concept, components and types
9.2 Firewall policy, rule sets and packet filters
9.3 Proxy Server, bastion host, DMZ and honeypot
9.4 ISA Server and IPTables
10.10.10.10. Wireless SecurityWireless SecurityWireless SecurityWireless Security
10.1 WAP and AP security
10.2 Wireless PKI
10.3 Wireless Security Solutions and auditing
11.11.11.11. System SecuritySystem SecuritySystem SecuritySystem Security
11.1 Desktop Security
11.2 Email security: PGP and S/MIME
11.3 Web Security: web authentication, SSL, IPSec, TLS and SET
11.4 VPN types and architecture
12.12.12.12. OS SecurityOS SecurityOS SecurityOS Security
12.1 OS Vulnerabilities, updates and patches
12.2 OS integrity checks
12.3 OS hardening (Linux and Windows 2003)
12.4 Trusted OS
13.13.13.13. Security ManagementSecurity ManagementSecurity ManagementSecurity Management
13.1 Network management and SNMP
13.2 Incident response
13.3 Risk Management
13.4 BCP and DR
14.14.14.14. Regulations and complianceRegulations and complianceRegulations and complianceRegulations and compliance
14.1 Law and policies
14.2 IT Act, IPC and copyright act
14.3 Privacy
14.4 Email policy
Certified Network Security Professional
www.vskills.in
Course OutlineCourse OutlineCourse OutlineCourse Outline
Networking ConceptsNetworking ConceptsNetworking ConceptsNetworking Concepts
Understanding the basics of communication systems like sender, media, receiver, etc.
Explaining the various transmission media and concept of OSI and TCP/IP protocols
Describing the concepts of LAN, WAN, wireless networks and internetworking
Detailing the different packet formats used by TCP/IP protocols and ports
Security ConceptsSecurity ConceptsSecurity ConceptsSecurity Concepts
Illustrating the principles and concepts of security
Describing the basics and techniques for identification and authentication
Explaining the various types of attack on computing resources
Detailing the concept of computer forensics for investigation and steganography for
information hiding
Security PolicySecurity PolicySecurity PolicySecurity Policy
Understanding the basics and method for defining security policies and guidelines
Defining the procedure to follow for security incidents
Security ModelsSecurity ModelsSecurity ModelsSecurity Models
Explaining the various security models like Biba , Bell-la padula, etc.
Describing the different types of access controls like mandatory or discretionary, etc.
CryptographyCryptographyCryptographyCryptography
Illustrating the evolution of cryptography and different data encryption ciphers used
Detailing the concepts and techniques for symmetric and asymmetric key
cryptography and private and public key exchange
Understanding the various techniques of secret key cryptography
Explaining the basics of message authentication, hash function, digital signature and
public key infrastructure (PKI)
Hardware SecurityHardware SecurityHardware SecurityHardware Security
Describing the concept and usage of smart card, access token and biometrics for
hardware-based security implementation
Router Hardening and ACLRouter Hardening and ACLRouter Hardening and ACLRouter Hardening and ACL
Understanding the process of routing and provisions for router security
Illustrating the steps to create and implement access control lists (ACL)
Describing the procedure to remove unwanted Protocols and Services and enable
router logging
IDSIDSIDSIDS
Explaining the concepts and types of intrusion detection systems (IDS)
Illustrating the signature detection in IDS and log analysis of IDS systems
Certified Network Security Professional
www.vskills.in
FirewallsFirewallsFirewallsFirewalls
Understanding the concept of firewall and various components and types of firewall
Describing the basics of firewall policy, rule sets and packet filters in firewall
Illustrating proxy server, bastion host, DMZ and honeypot used with firewall for
security management
Explaining the working of ISA Server and IPTables for Windows and Linux
Wireless SecurityWireless SecurityWireless SecurityWireless Security
Describing the basics of wireless application protocol and access point security
Explaining the usage of wireless PKI
Illustrating the various wireless security solutions and need for auditing
SSSSystem Securityystem Securityystem Securityystem Security
Detailing the techniques for desktop security by anti-virus software
Understanding Email security implementation by PGP and S/MIME
Explaining the concepts of web authentication, SSL, IPSec, TLS and SET for
implementing web security
Illustrating the basics of virtual private network (VPN), VPN types and architecture
for implementation
OS SecurityOS SecurityOS SecurityOS Security
Understanding the significance and basics of OS vulnerabilities, updates and patches
Illustrating the concept of OS integrity checks and trusted OS
Describing the techniques for OS hardening for Linux and Windows 2003
Security ManagementSecurity ManagementSecurity ManagementSecurity Management
Describing the essentials for network management and usage of SNMP for same
Explaining the procedure to manage incident response
Illustrating the process of risk management and analysis for securing assets
Understanding the concept and importance of business continuity planning and
disaster recovery for recovering from security incidents
Regulations and complianceRegulations and complianceRegulations and complianceRegulations and compliance
Explaining the relevance of laws and policies
Describing the IT Act, IPC and copyright act as applied to organization
Illustrating the concept and relevance of privacy as applied to data asset
Detailing the steps to publish and importance of email policy
Certified Network Security Professional
www.vskills.in
Sample QuestionsSample QuestionsSample QuestionsSample Questions
1.1.1.1. TheTheTheThe term TLS expandsterm TLS expandsterm TLS expandsterm TLS expands to ________________.to ________________.to ________________.to ________________.
A. Transport Level Security
B. Transport Layer Security
C. Transport Layer Setting
D. None of the above
2222. The. The. The. The cipher in which each letter is replaced by another letter is called _________.cipher in which each letter is replaced by another letter is called _________.cipher in which each letter is replaced by another letter is called _________.cipher in which each letter is replaced by another letter is called _________.
A. Transposition
B. Substitution
C. Hash convert
D. None of the above
3333. The. The. The. The DiffieDiffieDiffieDiffie----Hellman algorithm is used forHellman algorithm is used forHellman algorithm is used forHellman algorithm is used for ____________.____________.____________.____________.
A. Key deletion
B. Key generation
C. Key exchange
D. None of the above
4444. The. The. The. The term S/MIME refers to ____________.term S/MIME refers to ____________.term S/MIME refers to ____________.term S/MIME refers to ____________.
A. Secure/Multipurpose Internet Mail Extensions
B. Secure/Multipurpose Internet Media Extensions
C. Secure/Multipurpose Internet Multimedia Extensions
D. None of the above
5555. The. The. The. The port used by HTTPS protocol is ____________.port used by HTTPS protocol is ____________.port used by HTTPS protocol is ____________.port used by HTTPS protocol is ____________.
A. 443
B. 80
C. 21
D. None of the above
Answers: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)
Network Security Certification

More Related Content

What's hot

Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
Network Security Projects
Network Security ProjectsNetwork Security Projects
Network Security ProjectsPhdtopiccom
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and TypesVikram Khanna
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security IssuesAfreenYousaf
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network SecurityAditiPatni3
 
Network infrastructure security management solution - A holistic approach in ...
Network infrastructure security management solution - A holistic approach in ...Network infrastructure security management solution - A holistic approach in ...
Network infrastructure security management solution - A holistic approach in ...Twinkle Sebastian
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless NetworkingGulshanAra14
 
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionHTS Hosting
 
Topics in network security
Topics in network securityTopics in network security
Topics in network securityNasir Bhutta
 
Network security
Network securityNetwork security
Network securityAli Kamil
 
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesIcs & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesomriyad
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocolsOnline
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 

What's hot (20)

Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Network Security Projects
Network Security ProjectsNetwork Security Projects
Network Security Projects
 
Network security
Network securityNetwork security
Network security
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security Issues
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Fire walls
Fire wallsFire walls
Fire walls
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Network infrastructure security management solution - A holistic approach in ...
Network infrastructure security management solution - A holistic approach in ...Network infrastructure security management solution - A holistic approach in ...
Network infrastructure security management solution - A holistic approach in ...
 
Network Security
Network SecurityNetwork Security
Network Security
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Importance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat ProtectionImportance of Using Firewall for Threat Protection
Importance of Using Firewall for Threat Protection
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Network security
Network securityNetwork security
Network security
 
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesIcs & computer security for nuclear facilities
Ics & computer security for nuclear facilities
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 

Similar to Network Security Certification

Software Security Certification
Software Security CertificationSoftware Security Certification
Software Security CertificationVskills
 
cyber security analyst certification
cyber security analyst certificationcyber security analyst certification
cyber security analyst certificationVskills
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco Service Provider
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco Service Provider
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network DefenderITpreneurs
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Moshe Ferber
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Tech
 
Integrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsIntegrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsUlf Mattsson
 
Best CCNP (ENCOR 350 - 701) Training at NS3EDU
Best CCNP (ENCOR 350 - 701) Training at NS3EDUBest CCNP (ENCOR 350 - 701) Training at NS3EDU
Best CCNP (ENCOR 350 - 701) Training at NS3EDUNs3Edu
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 
Comp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationComp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationShivamSharma909
 
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated DesignCisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated DesignCisco Russia
 
"Exploring the Diverse World of CCNP Certifications" .pdf
"Exploring the Diverse World of CCNP Certifications"  .pdf"Exploring the Diverse World of CCNP Certifications"  .pdf
"Exploring the Diverse World of CCNP Certifications" .pdfarjunnegi34
 

Similar to Network Security Certification (20)

Software Security Certification
Software Security CertificationSoftware Security Certification
Software Security Certification
 
cyber security analyst certification
cyber security analyst certificationcyber security analyst certification
cyber security analyst certification
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
 
Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...Surviving the lions den - how to sell SaaS services to security oriented cust...
Surviving the lions den - how to sell SaaS services to security oriented cust...
 
Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst Lucideus Certified Cyber Security Analyst
Lucideus Certified Cyber Security Analyst
 
Integrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOpsIntegrate Security into DevOps - SecDevOps
Integrate Security into DevOps - SecDevOps
 
Cloud Security Solution Overview
Cloud Security Solution OverviewCloud Security Solution Overview
Cloud Security Solution Overview
 
Ccna security
Ccna security Ccna security
Ccna security
 
Best CCNP (ENCOR 350 - 701) Training at NS3EDU
Best CCNP (ENCOR 350 - 701) Training at NS3EDUBest CCNP (ENCOR 350 - 701) Training at NS3EDU
Best CCNP (ENCOR 350 - 701) Training at NS3EDU
 
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Comp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationComp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementation
 
Ccna security
Ccna security Ccna security
Ccna security
 
Ccna security
Ccna security Ccna security
Ccna security
 
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated DesignCisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
 
"Exploring the Diverse World of CCNP Certifications" .pdf
"Exploring the Diverse World of CCNP Certifications"  .pdf"Exploring the Diverse World of CCNP Certifications"  .pdf
"Exploring the Diverse World of CCNP Certifications" .pdf
 

More from Vskills

Vskills certified administrative support professional sample material
Vskills certified administrative support professional sample materialVskills certified administrative support professional sample material
Vskills certified administrative support professional sample materialVskills
 
vskills customer service professional sample material
vskills customer service professional sample materialvskills customer service professional sample material
vskills customer service professional sample materialVskills
 
Vskills certified operations manager sample material
Vskills certified operations manager sample materialVskills certified operations manager sample material
Vskills certified operations manager sample materialVskills
 
Vskills certified six sigma yellow belt sample material
Vskills certified six sigma yellow belt sample materialVskills certified six sigma yellow belt sample material
Vskills certified six sigma yellow belt sample materialVskills
 
Vskills production and operations management sample material
Vskills production and operations management sample materialVskills production and operations management sample material
Vskills production and operations management sample materialVskills
 
vskills leadership skills professional sample material
vskills leadership skills professional sample materialvskills leadership skills professional sample material
vskills leadership skills professional sample materialVskills
 
vskills facility management expert sample material
vskills facility management expert sample materialvskills facility management expert sample material
vskills facility management expert sample materialVskills
 
Vskills international trade and forex professional sample material
Vskills international trade and forex professional sample materialVskills international trade and forex professional sample material
Vskills international trade and forex professional sample materialVskills
 
Vskills production planning and control professional sample material
Vskills production planning and control professional sample materialVskills production planning and control professional sample material
Vskills production planning and control professional sample materialVskills
 
Vskills purchasing and material management professional sample material
Vskills purchasing and material management professional sample materialVskills purchasing and material management professional sample material
Vskills purchasing and material management professional sample materialVskills
 
Vskills manufacturing technology management professional sample material
Vskills manufacturing technology management professional sample materialVskills manufacturing technology management professional sample material
Vskills manufacturing technology management professional sample materialVskills
 
certificate in agile project management sample material
certificate in agile project management sample materialcertificate in agile project management sample material
certificate in agile project management sample materialVskills
 
Vskills angular js sample material
Vskills angular js sample materialVskills angular js sample material
Vskills angular js sample materialVskills
 
Vskills c++ developer sample material
Vskills c++ developer sample materialVskills c++ developer sample material
Vskills c++ developer sample materialVskills
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample materialVskills
 
Vskills financial modelling professional sample material
Vskills financial modelling professional sample materialVskills financial modelling professional sample material
Vskills financial modelling professional sample materialVskills
 
Vskills basel iii professional sample material
Vskills basel iii professional sample materialVskills basel iii professional sample material
Vskills basel iii professional sample materialVskills
 
Vskills telecom management professional sample material
Vskills telecom management professional sample materialVskills telecom management professional sample material
Vskills telecom management professional sample materialVskills
 
Vskills retail management professional sample material
Vskills retail management professional sample materialVskills retail management professional sample material
Vskills retail management professional sample materialVskills
 
Vskills contract law analyst sample material
Vskills contract law analyst sample materialVskills contract law analyst sample material
Vskills contract law analyst sample materialVskills
 

More from Vskills (20)

Vskills certified administrative support professional sample material
Vskills certified administrative support professional sample materialVskills certified administrative support professional sample material
Vskills certified administrative support professional sample material
 
vskills customer service professional sample material
vskills customer service professional sample materialvskills customer service professional sample material
vskills customer service professional sample material
 
Vskills certified operations manager sample material
Vskills certified operations manager sample materialVskills certified operations manager sample material
Vskills certified operations manager sample material
 
Vskills certified six sigma yellow belt sample material
Vskills certified six sigma yellow belt sample materialVskills certified six sigma yellow belt sample material
Vskills certified six sigma yellow belt sample material
 
Vskills production and operations management sample material
Vskills production and operations management sample materialVskills production and operations management sample material
Vskills production and operations management sample material
 
vskills leadership skills professional sample material
vskills leadership skills professional sample materialvskills leadership skills professional sample material
vskills leadership skills professional sample material
 
vskills facility management expert sample material
vskills facility management expert sample materialvskills facility management expert sample material
vskills facility management expert sample material
 
Vskills international trade and forex professional sample material
Vskills international trade and forex professional sample materialVskills international trade and forex professional sample material
Vskills international trade and forex professional sample material
 
Vskills production planning and control professional sample material
Vskills production planning and control professional sample materialVskills production planning and control professional sample material
Vskills production planning and control professional sample material
 
Vskills purchasing and material management professional sample material
Vskills purchasing and material management professional sample materialVskills purchasing and material management professional sample material
Vskills purchasing and material management professional sample material
 
Vskills manufacturing technology management professional sample material
Vskills manufacturing technology management professional sample materialVskills manufacturing technology management professional sample material
Vskills manufacturing technology management professional sample material
 
certificate in agile project management sample material
certificate in agile project management sample materialcertificate in agile project management sample material
certificate in agile project management sample material
 
Vskills angular js sample material
Vskills angular js sample materialVskills angular js sample material
Vskills angular js sample material
 
Vskills c++ developer sample material
Vskills c++ developer sample materialVskills c++ developer sample material
Vskills c++ developer sample material
 
Vskills c developer sample material
Vskills c developer sample materialVskills c developer sample material
Vskills c developer sample material
 
Vskills financial modelling professional sample material
Vskills financial modelling professional sample materialVskills financial modelling professional sample material
Vskills financial modelling professional sample material
 
Vskills basel iii professional sample material
Vskills basel iii professional sample materialVskills basel iii professional sample material
Vskills basel iii professional sample material
 
Vskills telecom management professional sample material
Vskills telecom management professional sample materialVskills telecom management professional sample material
Vskills telecom management professional sample material
 
Vskills retail management professional sample material
Vskills retail management professional sample materialVskills retail management professional sample material
Vskills retail management professional sample material
 
Vskills contract law analyst sample material
Vskills contract law analyst sample materialVskills contract law analyst sample material
Vskills contract law analyst sample material
 

Recently uploaded

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

Network Security Certification

  • 2. Certified Network Security Professional www.vskills.in CCCCertifiedertifiedertifiedertified Network SecurityNetwork SecurityNetwork SecurityNetwork Security ProfessionalProfessionalProfessionalProfessional Certification CodeCertification CodeCertification CodeCertification Code VS-1082 Vskills certification for Network Security Professional assesses the candidate for a company’s network security needs. The certification tests the candidates on various areas in network security which includes knowledge of networking, cryptography, implementation and management of network security measures. Why should one take this certification?Why should one take this certification?Why should one take this certification?Why should one take this certification? This Course is intended for professionals and graduates wanting to excel in their chosen areas. It is also well suited for those who are already working and would like to take certification for further career progression. Earning Vskills Network Security Professional Certification can help candidate differentiate in today's competitive job market, broaden their employment opportunities by displaying their advanced skills, and result in higher earning potential. Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification?Who will benefit from taking this certification? Job seekers looking to find employment in IT or network security department of various companies, students generally wanting to improve their skill set and make their CV stronger and existing employees looking for a better role can prove their employers the value of their skills through this certification Test DetaiTest DetaiTest DetaiTest Detailslslsls • Duration:Duration:Duration:Duration: 60 minutes • No. of questions:No. of questions:No. of questions:No. of questions: 50 • Maximum marks:Maximum marks:Maximum marks:Maximum marks: 50, Passing marks: 25 (50%) There is no negative marking in this module. Fee StructureFee StructureFee StructureFee Structure Rs. 4,500/- (Includes all taxes) Companies that hire Vskills CertifiedCompanies that hire Vskills CertifiedCompanies that hire Vskills CertifiedCompanies that hire Vskills Certified Network SecurityNetwork SecurityNetwork SecurityNetwork Security ProfessionalProfessionalProfessionalProfessional Network security professional are in great demand. Companies specializing in securing and implementation of computer networks are constantly hiring knowledgeable professionals. Various public and private companies also need network security professional for securing and managing their computer networks.
  • 3. Certified Network Security Professional www.vskills.in Table of ContentTable of ContentTable of ContentTable of Content 1.1.1.1. Networking ConceptsNetworking ConceptsNetworking ConceptsNetworking Concepts 1.1 Basics of Communication Systems 1.2 Transmission Media, OSI and TCP/IP stack 1.3 LAN, WAN, Wireless networks and internetworking 1.4 Packet formats and ports 2.2.2.2. Security ConceptsSecurity ConceptsSecurity ConceptsSecurity Concepts 2.1 Security principles and concepts 2.2 Identification and authentication 2.3 Attack types 2.4 Computer Forensics and steganography 3.3.3.3. Security PolicySecurity PolicySecurity PolicySecurity Policy 3.1 Security policies and guidelines 3.2 Defining incident handling procedure 4.4.4.4. Security ModelsSecurity ModelsSecurity ModelsSecurity Models 4.1 Security models (Biba , Bell-la padula, etc.) 4.2 Access controls (MAC, policy, DAC, etc.) 5.5.5.5. CryptographyCryptographyCryptographyCryptography 5.1 Evolution and data encryption methods 5.2 Symmetric and Asymmetric key Cryptography 5.3 Private and public key exchange 5.4 Secret key cryptography 5.5 Message Authentication and Hash functions 5.6 Digital Signatures and public key infrastructure 6.6.6.6. Hardware SecurityHardware SecurityHardware SecurityHardware Security 6.1 Smart card 6.2 Access token 6.3 Biometrics 7.7.7.7. Router Hardening and ACLRouter Hardening and ACLRouter Hardening and ACLRouter Hardening and ACL 7.1 Routing Process and router security 7.2 Create and implement access control lists (ACL) 7.3 Remove Unwanted Protocols and Services and router logging 8.8.8.8. IDSIDSIDSIDS 8.1 IDS concepts and types 8.2 Signature detection and log analysis
  • 4. Certified Network Security Professional www.vskills.in 9.9.9.9. FirewallsFirewallsFirewallsFirewalls 9.1 Concept, components and types 9.2 Firewall policy, rule sets and packet filters 9.3 Proxy Server, bastion host, DMZ and honeypot 9.4 ISA Server and IPTables 10.10.10.10. Wireless SecurityWireless SecurityWireless SecurityWireless Security 10.1 WAP and AP security 10.2 Wireless PKI 10.3 Wireless Security Solutions and auditing 11.11.11.11. System SecuritySystem SecuritySystem SecuritySystem Security 11.1 Desktop Security 11.2 Email security: PGP and S/MIME 11.3 Web Security: web authentication, SSL, IPSec, TLS and SET 11.4 VPN types and architecture 12.12.12.12. OS SecurityOS SecurityOS SecurityOS Security 12.1 OS Vulnerabilities, updates and patches 12.2 OS integrity checks 12.3 OS hardening (Linux and Windows 2003) 12.4 Trusted OS 13.13.13.13. Security ManagementSecurity ManagementSecurity ManagementSecurity Management 13.1 Network management and SNMP 13.2 Incident response 13.3 Risk Management 13.4 BCP and DR 14.14.14.14. Regulations and complianceRegulations and complianceRegulations and complianceRegulations and compliance 14.1 Law and policies 14.2 IT Act, IPC and copyright act 14.3 Privacy 14.4 Email policy
  • 5. Certified Network Security Professional www.vskills.in Course OutlineCourse OutlineCourse OutlineCourse Outline Networking ConceptsNetworking ConceptsNetworking ConceptsNetworking Concepts Understanding the basics of communication systems like sender, media, receiver, etc. Explaining the various transmission media and concept of OSI and TCP/IP protocols Describing the concepts of LAN, WAN, wireless networks and internetworking Detailing the different packet formats used by TCP/IP protocols and ports Security ConceptsSecurity ConceptsSecurity ConceptsSecurity Concepts Illustrating the principles and concepts of security Describing the basics and techniques for identification and authentication Explaining the various types of attack on computing resources Detailing the concept of computer forensics for investigation and steganography for information hiding Security PolicySecurity PolicySecurity PolicySecurity Policy Understanding the basics and method for defining security policies and guidelines Defining the procedure to follow for security incidents Security ModelsSecurity ModelsSecurity ModelsSecurity Models Explaining the various security models like Biba , Bell-la padula, etc. Describing the different types of access controls like mandatory or discretionary, etc. CryptographyCryptographyCryptographyCryptography Illustrating the evolution of cryptography and different data encryption ciphers used Detailing the concepts and techniques for symmetric and asymmetric key cryptography and private and public key exchange Understanding the various techniques of secret key cryptography Explaining the basics of message authentication, hash function, digital signature and public key infrastructure (PKI) Hardware SecurityHardware SecurityHardware SecurityHardware Security Describing the concept and usage of smart card, access token and biometrics for hardware-based security implementation Router Hardening and ACLRouter Hardening and ACLRouter Hardening and ACLRouter Hardening and ACL Understanding the process of routing and provisions for router security Illustrating the steps to create and implement access control lists (ACL) Describing the procedure to remove unwanted Protocols and Services and enable router logging IDSIDSIDSIDS Explaining the concepts and types of intrusion detection systems (IDS) Illustrating the signature detection in IDS and log analysis of IDS systems
  • 6. Certified Network Security Professional www.vskills.in FirewallsFirewallsFirewallsFirewalls Understanding the concept of firewall and various components and types of firewall Describing the basics of firewall policy, rule sets and packet filters in firewall Illustrating proxy server, bastion host, DMZ and honeypot used with firewall for security management Explaining the working of ISA Server and IPTables for Windows and Linux Wireless SecurityWireless SecurityWireless SecurityWireless Security Describing the basics of wireless application protocol and access point security Explaining the usage of wireless PKI Illustrating the various wireless security solutions and need for auditing SSSSystem Securityystem Securityystem Securityystem Security Detailing the techniques for desktop security by anti-virus software Understanding Email security implementation by PGP and S/MIME Explaining the concepts of web authentication, SSL, IPSec, TLS and SET for implementing web security Illustrating the basics of virtual private network (VPN), VPN types and architecture for implementation OS SecurityOS SecurityOS SecurityOS Security Understanding the significance and basics of OS vulnerabilities, updates and patches Illustrating the concept of OS integrity checks and trusted OS Describing the techniques for OS hardening for Linux and Windows 2003 Security ManagementSecurity ManagementSecurity ManagementSecurity Management Describing the essentials for network management and usage of SNMP for same Explaining the procedure to manage incident response Illustrating the process of risk management and analysis for securing assets Understanding the concept and importance of business continuity planning and disaster recovery for recovering from security incidents Regulations and complianceRegulations and complianceRegulations and complianceRegulations and compliance Explaining the relevance of laws and policies Describing the IT Act, IPC and copyright act as applied to organization Illustrating the concept and relevance of privacy as applied to data asset Detailing the steps to publish and importance of email policy
  • 7. Certified Network Security Professional www.vskills.in Sample QuestionsSample QuestionsSample QuestionsSample Questions 1.1.1.1. TheTheTheThe term TLS expandsterm TLS expandsterm TLS expandsterm TLS expands to ________________.to ________________.to ________________.to ________________. A. Transport Level Security B. Transport Layer Security C. Transport Layer Setting D. None of the above 2222. The. The. The. The cipher in which each letter is replaced by another letter is called _________.cipher in which each letter is replaced by another letter is called _________.cipher in which each letter is replaced by another letter is called _________.cipher in which each letter is replaced by another letter is called _________. A. Transposition B. Substitution C. Hash convert D. None of the above 3333. The. The. The. The DiffieDiffieDiffieDiffie----Hellman algorithm is used forHellman algorithm is used forHellman algorithm is used forHellman algorithm is used for ____________.____________.____________.____________. A. Key deletion B. Key generation C. Key exchange D. None of the above 4444. The. The. The. The term S/MIME refers to ____________.term S/MIME refers to ____________.term S/MIME refers to ____________.term S/MIME refers to ____________. A. Secure/Multipurpose Internet Mail Extensions B. Secure/Multipurpose Internet Media Extensions C. Secure/Multipurpose Internet Multimedia Extensions D. None of the above 5555. The. The. The. The port used by HTTPS protocol is ____________.port used by HTTPS protocol is ____________.port used by HTTPS protocol is ____________.port used by HTTPS protocol is ____________. A. 443 B. 80 C. 21 D. None of the above Answers: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)