Thursday 27 February 2014

CCNP Security certification program in Bangalore


CCNP Security certification program in Bangalore is aligned specifically to the job role of the Cisco Network Security Engineer responsible for Security in Routers, Switches, Networking devices and appliances, as well as choosing, deploying, supporting and troubleshooting Firewalls, VPNs, and IDS/IPS solutions for their networking environments. The CCNP Security certification is the most efficient way to ensure Network Security Engineers have the practical skills needed to deploy, service, maintain, and support Cisco network security solutions. CCNP Security delivers the practical skills needed to enforce cybersecurity performance, gain high quality security service levels, and meet compliance mandates.

CCNP Security is an evolution of the CCSP certification and is aligned specifically to the job role of the Cisco Network Security Engineer. Over the next year, CCNP Security will replace CCSP as Cisco’s professional level security certification for new candidates. CCSP will be recognized as a valid and relevant Cisco Security certification meeting all requirements by Cisco and its partner program for a full 3 year active period until 2014.

CCSP exams will remain available until April 2011 and individuals can still obtain a new CCSP certification until October 2011. New CCSP certifications will no longer be issued after October 2011. Cisco strongly encourages individuals to take the newer, relevant CCNP Security exams instead of the older CCSP exams.

Prerequisite : Valid CCNA Security Certification.
Key Benefits : This new certification program is for Cisco Network Security Engineers who are responsible for testing, deploying, configuring, and troubleshooting the core technologies that make up a Cisco secure network. The new CCNP Security curriculum assesses an engineer’s competency in using network-critical technologies and products, such as Cisco IOS security features in Cisco routers and switches, firewalls, VPNs, and intrusion prevention and detection systems.

Course Contents :
642-637 SECURE v1.0 (Secure v1.0 Securing Networks with Cisco Routers and Switches)
Module 1: Deploying Cisco IOS Software Network Foundation Protection Lesson
· Deploying Network Foundation Protection Controls
· Deploying Advanced Switched Data Plane Security Controls
· Implementing Cisco Identity-Based Network Services
· Deploying Basic 802.1X Features
· Deploying Advanced Routed Data Plane Security Controls
· Deploying Advanced Control Plane Security Controls
· Deploying Advanced Management Plane Security Controls

Module 2: Deploying Cisco IOS Software Threat Control and Containment
· Deploying Cisco IOS Software Network Address Translation
· Deploying Basic Zone-Based Policy Firewalls
· Deploying Advanced Zone-Based Policy Firewalls
· Deploying Cisco IOS Software IPS

Module 3: Deploying Cisco IOS Software Site-to-Site Transmission Security
· Site-to-Site VPN Architectures and Technologies
· Deploying VTI-Based Site-to-Site IPsec VPNs
· Deploying Scalable Authentication in Site-to-Site IPsec VPNs
· Deploying DMVPNs
· Deploying High Availability in Tunnel-Based IPsec VPNs
· Deploying GET VPN

Module 4: Deploying Secure Remote Access with Cisco IOS Software
· Remote Access VPN Architectures and Technologies
· Deploying Remote Access Solutions Using SSL VPN
· Deploying Remote Access Solutions Using Cisco Easy VPN

642-627 (IPS v7.0 Implementing Cisco Intrusion Prevention System v7.0)
· Introduction to Intrusion Prevention and Detection, Cisco IPS Software, and Supporting Devices
· Installing and Maintaining Cisco IPS Sensors
· Applying Cisco IPS Security Policies
· Adapting Traffic Analysis and Response to the Environment
· Managing and Analyzing Events
· Deploying Virtualization, High Availability, and High Performance Solutions
· Configuring and Maintaining Specific Cisco IPS Hardware

42-617 FIREWALL v1.0 Deploying Cisco ASA Firewall Solutions
· Introduction to the Cisco ASA Adaptive Security Appliance
· Implementation of Basic Connectivity and Device Management
· Deployment of Cisco ASA Adaptive Security Appliance Access Control Features
· Deployment of Cisco ASA Adaptive Security Appliance Network Integration Features
· Deployment of Cisco ASA Adaptive Security Appliance Virtualization and High-Availability Features
· Integration of Cisco ASA Adaptive Security Appliance Security Service Modules
· Configuring Routing on the Cisco ASA Adaptive Security Appliance
· Lab (Optional): Configuring Dynamic Routing

642-647 VPN v1.0 Deploying Cisco ASA VPN Solutions
· Evaluate the Cisco ASA adaptive security appliance VPN subsystem
· Deploy Cisco ASA adaptive security appliance IPsec VPN solutions
· Deploy Cisco ASA adaptive security appliance Cisco AnyConnect remote access VPN solutions
· Deploy Cisco ASA adaptive security appliance clientless remote access VPN solutions
· Deploy advanced Cisco ASA adaptive security appliance VPN

Monday 17 February 2014

CCNA Security certification

640-553 IINS (Implementing Cisco IOS Network Security)

The CCNA Security certification lays the foundation for job roles such as Network Security Specialist, Security Administrator and Network Security Support Engineer in Bangalore or in all over India. It is the first step for individuals wishing to obtain their CCSP certification. CCNA Security certifications are valid for three years. The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification. 

Prerequisite : Valid CCNA or any CCIE Certification can act as a pre-requisite.
Duration of the course :
Part Time : 29 Session ( 2Hrs/Day) 
Full Time : 14 Session (4Hrs/Day)
Module 1:Introduction to Network Security Principles
  • Describe and list mitigation methods for common network attacks.
  • Describe and list mitigation methods for Worm, Virus, and Trojan horse attacks.
  • Describe the Cisco Self Defending Network architecture.


Module 2: Perimeter Security
  • Secure Cisco routers using the SDM Security Audit Feature.
  • Secure Cisco routers by configuring multiple priviledge levels and role based CLI.
  • Implement AAA on Cisco routers using local router database and external ACS.
  • Mitigate threats to Cisco router and networks using ACLs.


Module 3: Network Security Using Cisco IOS Firewalls
  • Configure IP ACLs to prevent IP address spoofing using CLI.
  • Discuss the caveats to be considered when building ACLs.
  • Use CLI and SDM to configure Cisco routers to send Syslog messages to a Syslog server.
  • Mitigation common Layer 2 Attacks.
  • Describe the operational strengths and weaknesses of the different firewall technologies.
  • Explain stateful firewall operations and the function of the state table.
  • Implement Zone Based Firewall using SDM.
  • Define network based vs. host based intrusion detection and prevention.


Module 4: Network Security Using Cisco IOS IPS
  • Explain IPS technologies , attack response, and monitoring options.
  • Enable and verify Cisco IOS IPS operations using SDM.


Module 5: Site-to-Site VPNs
  • Explaing the different methods used in cryptography.
  • Explain IKE protocol functionality and phases.
  • Describe the building blocks of IPSec and the security functions it provides.
  • Configure and verify an IPSec site- to –site VPN with pre-shared key authentication using SDM.

Module 6: LAN, SAN, Voice, and Endpoint Security Overview

Sunday 16 February 2014

CCSPA

Security Triad:
  • •Confidentiality
  • •Integrity
  • •Availability


Principles of Secure Design:
  • •Principles
  • •Principles and Reality


Risk Management:
  • •Assets
  • •Threats, Vulnerabilities, and Risk
  • •Asset Value and Loss
  • •Counter-measures


Security Policies:
  • •Types of Security Policies
  • •Administering Security Policies


Business Continuity Planning:
  • •Business Continuity Planning
  • •Business Impact Analysis
  • •BCP Development
  • •Testing a BCP
  • •BCP Life Cycle


Operational Security:
  • •Operational Security Defined
  • •Origins of OPSEC
  • •Laws of OPSEC
  • •Know Your Adversary
  • •Intelligence Gathering
  • •Physical Security
  • •Administrative Controls


Access Controls Models:
  • •Confidentiality Access Control Model
  • •Integrity Access Control Model
  • •Access Control Models


Communicating Security Effectively:
  • •Information Technology Staff Security Communications
  • •Other Staff Security Communications Training
  • •Management and Executive Staff Security Communications
Security Architecture:
  • •Security Architecture Theory
  • •System Security Architecture
  • •Secure Network Architecture


Intrusion Detection:
  • •Intrusion Defined
  • •Types of Intruders
  • •Intrusion Detection Concepts
  • •Types of Intrusion Detection
  • •Intrusion Detection Systems


Cryptography:
  • •A Brief History of Cryptography
  • •How Encryption Works
  • •Encryption Algorithms
  • •Internet Key Exchange


Baselining and Penetration Testing:
  • •Baselining
  • •Penetration Testing


Access Control Technologies:
  • •Authentication Methods
  • •Access Control Methods
  • •Access Control Technologies
  • •Administering Access Control
  • •Accountability


Small-Network Security:
  • •Remote Office/Branch Office
  • •Remote Users
  • •Small Businesses
  • •Home Users


Intranets, Extranets, and Virtual Corporations:
  • •Intranets
  • •Extranets
  • •Virtual Corporations


Securing the Enterprise:
  • •Security Goals and Functions

Tuesday 11 February 2014

Rooman Technologies Pvt. Ltd

Rooman Technologies Pvt. Ltd

Introduction :

ROOMAN was incorporated on June 9th 1999 as a Private Limited Company by two entrepreneurial IT professionals, Mr. Manish Kumar and Mr. Nandagopal. ROOMAN began with a vision of Globe very soon becoming Information based world. Its mission is to fulfill the massive requirements of IT Industry, rendering IT education to broad spectrum of people, from students seeking a career in computers to IT professionals requiring more advanced skills, from managers giving careers a polished edge, to children using computers as a efficient tutor. We are proud to be the pioneers in "Hardware and Networking". Just when everyone was bent upon Software, we foresaw the tremendous potential in Hardware and Networking, and successfully emerged as one of the best IT Company for Hardware and Networking Solutions and the best institute for Hardware and Networking Training. Today the two sides of its business are equally balanced. The expertise of its training is coupled with a strong commitment to provide the best Hardware and Networking solutions. This has put Rooman in the unique position of deriving synergies between Network Solutions and IT Training.

Technical Staff :


At Rooman, we have versatile, highly qualified and certified Hardware and Networking Engineers with varied academic backgrounds. The teaching staff are in the field with the complete understanding of the IT industry, its prospects and are provident enough to see to it that you are equipped with the latest knowledge in the ever changing world of IT industry.

On-line Interactive Learning :


We believe in On-line Interactive learning. That is to say, the problems, or doubts which students often face, while sitting before a system, is cleared by our staff as soon as they surface. This way our students learn more.

et experienced while Learning :


After extensive learning, we subject our students to some Real Time situations (which is often created by our staff) and student left alone, to handle the situation, to overcome the problem, with his own solutions. In this way, he is getting experienced, even before the completion of course and is very much ready to seek the job with tremendous confidence.

Teaching Strategy :


There is a saying, which goes like "It takes lot of beatings to make a pot". here we literally follow this method of beatings; Beatings it is now in the begining- to beat the world later. Our training is vigorous. At Rooman we run strict schedules and conduct several crucial tests so as to prepare you for the challenges you are going to face in the IT world as soon as you step out of Rooman.

Technical Facility :


Our labs are enoromus and equipped with the latest systems available in the industry today. We also have product mainteinance engineers who see to it that our systems are fully functional at all times. We have a good library, shelving books with latest versions and editions covering various topics on Real Time situations and Trobuleshooting, etc.