Defense In Depth

Click Here to Fill the Enquiry Form

Course No: IS0083
Any single defense may be flawed, and so a series of different defenses should be used to cover the gaps in the others’ protective capabilities. Firewalls, intrusion detection systems, malware scanners, integrity auditing procedures, and local storage encryption tools can each serve to protect information technology resources in a layered approach. This course teaches the strategies for defense in Depth.
This  course will be useful for almost computer engineers having basic knowledge of will anyway keep them aware with secure strategy irrespective of being in testing or in development. Specifically this program will be helpful to following genre of people:

  • Network/System Administrators
  • Penetration Testers
  • Exploit Researchers/Developers
  • Aspirant Engineering Bachelors
We have some pre-requisite for this course. These are not mandatory but having them will certainly be a benefit for you.

  • Basic knowledge of OSI model, Operating System
  • Basic Ethical Hacking Course
  • Network Security Course
  • Web Application Security Course
Layered Security

  • Multiple types of security measures, each protecting against a different vector for attack.
  • Vertically integrated stack solution – antivirus, firewall. anti-spam, parental controls, privacy controls

Defense In Depth

  • Layered security as only one component of a defense in depth strategy.
  • Monitoring, alerting, and emergency response
  • Authorized personnel activity accounting
  • Disaster recovery
  • Criminal activity reporting
  • Forensic analysis
Threat delaying

  • Immediate Notification

People, Process and Environment


DLP

$225

₹ 12,100
  • Slides Booklet
  • Tools/SW
  • Lab Booklet with Code Scripts
  • Class Room Demo
  • Hands On Training
  • Training Videos
  • Cloud Lab Access
  • Lifetime Support
  • Deliverable Via Post
  • 3 Months Access
$ 225

₹ 12,100

Online

$175

₹ 9,500
  • Slides Booklet
  • Tools/SW
  • Lab Booklet with Code Scripts
  • Class Room Demo
  • Hands On Training
  • Training Videos
  • Cloud Lab Access
  • Lifetime Support
  • Deliverable Via Downloads
  • 3 Months Access
$ 175

₹ 9,500

Virtual Class

$300

₹ 16,200
  • Slides Booklet
  • Tools/SW
  • Lab Booklet with Code Scripts
  • Class Room Demo
  • Hands On Training
  • Training Videos
  • Cloud Lab Access
  • Lifetime Support
  • Deliverable Via Downloads
  • 30 Hours Virtual Class
$ 300

₹ 16,200

Have a query?

You got any doubt, question, suggestion in mind? Contact us.

One of our team member will get back to you asap.

Would like to tell the world about this course? Why not share it?

 

 

 

Course No: IS0073
Duration: 56 Hours (7 Days)

With happening of hacking incidents, we can see different type of malware popping out in the market. These can vary in size, type, functionality and techniques. AV companies keep studying about this and try to identify the characteristics of these malwares.

Certified Malware Analyst program is focused to teach you everything about malware analysis. We teach you all this using case studies in our simulated virtual labs which makes you learn the things with hands on experience on real time malwares and there case studies.

Course Modules:

Introduction To Malware Analysis

    • Malware Terminology.
    • Threats of Malwares.
    • Malware Analysis Methodologies.
    • Legal Considerations.
    •  Identification from Malware.
    • Protection from Malware.
    • Collecting Malware from Live Systems.
    • Identifying Malware in Dead systems.

Setting up a Malware Analysis Lab

    • Virtualization
    • Tools for Malware Analysis

Static Analysis

    • Detailed File Analysis.
    • Database of File Hashes.
    • Identifying File Compile Date.
    • Identifying Packing/Obfuscation Methods.
    • Performing Strings.
    • Designing a Security Policy.
    • File Signature Analysis.
    • Local and Online Malware Scaanning.
    • File Dependency Identification.

Dynamic Analysis

    • Host Integrity Monitor.
    • Baselining the System.
    • Installation Monitor.
    • Process Monitor.
    • File Monitor.
    • Registry Monitors.
    • Network Traffic Analysis.
    • Port Monitoring.
    • DNS Monitoring.
    • Simulation of Internet Services.

Analyzing the Code

    • Basics of Reverse Engineering.
    • Reverse Engineering Malicious Objects.
    • Extracting Malware Passwords.
    • Authentication Byepass.

Analyzing Malicious Documents

    • PDF and MS Office Document Structures.
    • PDF and MS Office Document Vulnerabilities.
    • Malware Extraction and Analysis Tools.
    • Malicous Documents analysis.

Beyond The Wall : The Challenging Part

    • Virtual Machines.
    • Distinguishing Real and Fake services.
    • Anti-Debugging Malwares.
    • Anti-Forensics Malwares.
Jay KumarDefense In Depth

Leave a Reply