Security+
FMIT-05

Duration: 5 days
Course description:
Security+ is a certification dealing with computer security topics such as cryptography and access control, as well as business related topics such as disaster recovery and risk management. it ensures that security personnel are anticipating security risks and guarding against them. This course prepares the participants to appear for the CompTIA Security+ certification test.

Who would benefit:
System / network administrators


Mitigating threats
Symmetric cryptography & Public Key cryptography
Authentication systems
Messaging security
User and role based security
Public Key infrastructure
Access security
Ports and protocols
Network security
Business continuity

Certified Ethical Hacker
FMIT-08

Duration: 5 days
Course description:
This authorized training course will not only prepare participants for the EC- Council Certified Ethical Hacker (CEH) but will immerse them into an interactive environment that will allow scanning, testing, hacking and securing their own systems. This course, will provide hands on understanding of and experience in ethical hacking.


Who would benefit:
IT Security Professionals


Hacking laws
Footprinting
Google Hacking
Scanning
Enumeration
System hacking
Trojans and Backdoors
Viruses and Worms
MAC OS X Hacking
Hacking routers, cable modems and firewalls
Hacking mobile phones, PDA and handheld devices
Bluetooth hacking
VoIP hacking
RFID hacking

Information Security for Professionals
FMIT-21

Duration: 3 days
Course description:
This course presents the current landscape of enterprise information security, looking at industry specific issues, and taking a more management oriented perspective rather than digging into the specifics of each technology. Crucial concepts will be presented through the use of case studies, scenarios and practical examples.

Who would benefit:
Professionals with direct or indirect impact on the security decision making process


Information assurance
Network security
Operating system security
Web security
Secure communications
Threats and vulnerabilities
Current threat landscape
Risk assessment and risk management

IP Networks Security
FMIT-22

Duration: 5 days
Course description:
The explosive growth in computer systems and their interconnections via networks has increased the dependence of both organizations and individuals on the information stored and communicated. This, in turn, has led to a heightened awareness of the need to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network based attacks.

Who would benefit:
Network administrators


Building a Secure Organisation
A Cryptography Primer
Verifying User and Host Identity
Preventing System Intrusions
Guarding Against Network Intrusions
Ensuring Network Confidentiality
Managing the Organisation’s Security

ISA Server 2006 Technical Overview
FMIT-23

Duration: 3 days
Course description:
Internet security is one of the major concerns of system/network administrators in any organization. There is a constant threat to networks of being attacked. This course will help use In- ternet Security and Acceleration (ISA) Server to securely publish content for remote access, connect and secure branch offices, and defend against external and internal web-based threats.





Who would benefit:
System/Network Administrators


Configuring Outbound Internet Access
Publishing Web Servers and Other Servers
Publishing a Microsoft Exchange Server
Enabling VPN Connections
ISA Server as Branch Office Gateway
Enterprise Management of ISA Servers
Configuring Load Balancing

Certified Ethical Hacker (CEH)
FEIT-01

Duration: 5 days
Course description:
This authorized training course will not only prepare participants for the EC- Council Certified Ethical Hacker (CEH) exam 312-50, but will immerse them into an interactive environment that will allow scanning, testing, hacking and securing their own systems.

Who would benefit:
Ethical Hacking overview
Footprinting and Reconnaissance
Scanning Networks
Enumeration
System Hacking
Trojans and Backdoors
Viruses and Worms