0% found this document useful (0 votes)
22 views2 pages

Info Menu

Uploaded by

aritogaming07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views2 pages

Info Menu

Uploaded by

aritogaming07
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Table of Contents

Unit 1: Introduction to Information Security


1. Chapter 1: Overview of Information Security
1.1 Introduction to Information Security
1.2 Key Components of Information Security
1.3 Importance of Information Security

2. Chapter 2: Various Aspects of Information Security (PAIN)


2.1 Privacy
2.2 Authentication
2.3 Integrity
2.4 Non-repudiation

3. Chapter 3: Security Features of Operating Systems


3.1 Authentication Mechanisms
3.2 Logging and Audit Features
3.3 File System Protection
3.4 User Privileges
3.5 RAID Options
3.6 Anti-Virus Software

Unit 2: Security Weaknesses in Networking Protocols and Devices


4. Understanding Security Weaknesses in Networking Protocols
4.1 IP Protocol
4.2 TCP Protocol
4.3 UDP Protocol
4.4 RIP Protocol
4.5 OSPF Protocol
4.6 HTTP Protocol
4.7 SMTP Protocol

5. Security Weaknesses in Common Networking Devices


5.1 Hub
5.2 Switch
5.3 Router
5.4 WiFi Devices

6. Security Solutions for Networking Protocols and Devices


6.1 IPSec
6.2 HTTPS
6.3 VLAN
6.4 VPN
6.5 Ingress Filtering

Unit 3: Basics of Cryptography and Software Security


7. Chapter 7: Basics of Cryptography
7.1 Cryptographic Principles
7.2 Types of Cryptography
7.3 Public Key Infrastructure (PKI)

8. Chapter 8: Security Considerations in Software Development


8.1 Secure Coding Practices
8.2 Common Software Security Flaws
8.3 Best Practices in Software Security

Unit 4: Network Security Products


9. Chapter 9: Firewall Technologies
9.1 Types of Firewalls
9.2 Firewall Configurations
9.3 Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)
9.4 VPN Concentrators
9.5 Content Screening Gateways

Unit 5: Introduction to Security Standards and Practices


10. Chapter 10: Security Standards
10.1 ISO 27001
10.2 Indian IT Act
10.3 Intellectual Property Rights (IPR) Laws

11. Chapter 11: Security Audit and Policy Development


11.1 Security Audit Procedures
11.2 Developing Security Policies
11.3 Disaster Recovery Planning
11.4 Business Continuity Planning

You might also like