Course Duration


Course Objectives

As more and more confidential information is stored and processed electronically, the risk of unauthorized access is on the rise. The Internet are fantastic places to converse, conduct business, do research, or simply relax and play a few games. But unfortunately, it's also a place where some individuals would like to create havoc by committing fraud, identity theft, robbery, or to commit more serious crimes. Data breaches and attacks make protection critical.

Telecontran’s 5-day Workshop on Network Security and Cyber Security takes a high-level look at how organisation can protect against such attacks by describing how to build, operate and maintain a comprehensive set of security controls.

After successful completion of this workshop, participants will be able to

  • Define the architecture, design and management of the security of the organization.
  • Analyze exposure to security threats
  • Protect organization's systems and data
  • Deploy firewalls and data encryption to minimize threats
  • Assess alternative user and host authentication mechanisms
  • Manage risks originating from inside the organization and the internet.

Target Audience

  • IT professionals in the area of cyber security
  • Security testers looking to understand new engineering approaches of testing
  • Project managers, quality managers, cyber security managers, business analysts or IT directors looking for a comprehensive training in cyber security systems engineering
  • Information technology professionals, web engineers, security analysts, policy analysts
  • Technicians, operators, and maintenance personnel who are or will be working on network security projects

Course Curriculum

Module 1: Security Basics
  • Introduction to Network Security
  • Internet Architecture and Vulnerable Security Aspect
  • Importance of effective Network Security Strategy
  • Cyber Trends
  • Challenges in Cyber Security
Module 2: Security Threats
  • Types of threats
  • Phishing and spear phishing
  • Common Internet Attack Methods
  • Eavesdropping / Viruses / Worms and Trojans
  • IP Spoofing Attacks
  • Denial of Service (Dos)

Course Curriculum

Module 3: Security Assessments
Module 4: Host and Software Security
  • Security Programming Techniques
  • Trusted Computing Infrastructure (TCI)
  • Low Level Software Security Attacks and Protection
  • Web Security
  • Secure Software Design Principles
  • Cloud Security
  • Data Security and Privacy (DAP)
  • Wireless Network Security
  • Mobile System Security
  • Hardware Metering
  • Fault Injection Attacks in Hardware
  • Physical Hardware Attacks
  • Secure Hardware Design for FPGAs
  • Hardware Trojans
  • Crypto Processor Design

Course Curriculum

Module 5: Network Security
Module 6: Identity and Access Management
  • Importance of Identity and Access Management
  • Physical and Logical Access to Assets
  • Access Subject Object and Access controls
  • Identification Authentication and Authorization
  • Biometrics—Characteristics
  • Passwords / Tokens / Memory Cards and Smart Cards
  • Directory Management
  • SSO
  • Access Control Models
  • Identity as Service
Module 7: Cryptography
  • Main Aspects of Cryptography
  • Stream Ciphers / Block Ciphers
  • Cryptography Algorithms
  • Public Key Encryption (PKI)
  • Hash Functions and Data Integrity
  • Digital Signature
  • GPG
  • Digital Certificate
  • Advance Cryptography
  • Cryptographic Threats and Tools

Course Curriculum

Module 8: Operational Security
Module 9: Incident Management
  • Types of incidents
  • Incident response and business continuity planning
  • Incident Management Team (IMT)
  • Incident Response Team (IRT)
  • Incident recovery
  • Incident handling response
  • Incident management metrics
Module 10: Analyzing and Managing Risk
  • Components of risk Basics of Risk Management

Course Curriculum

Module 11: Business Continuity and Disaster Recovery Plans
  • Business Recovery and Facility and Supply
  • Business continuity management
  • Business resumption plan
  • Disaster Recovery—Planning Design and Development
  • Redundancy and Fault Tolerance
  • Planning Design and Development
  • Implementation, Testing, and Training
  • Maintenance
Module 12: Lab Sessions
  • Demonstration of various tools for port scanning
  • DoS attack
  • Sniffer
  • Firewall configuration

Public Schedule

Training Date
“Please feel free to contact for any further details at