Impetus is dedicated to provide unique,
pragmatic and innovative career solutions

Network Security

The course covers principles of network security. We will discuss various attack techniques and how to defend against them. Topics include network attacks and defenses, operating system holes, web security, e-mail, botnet, malware, social engineering attacks, privacy, and digital rights management. Course projects will focus on building reliable code and understanding attacks.

Prerequisites: Network administration

Course Goals and Learning Objectives

Students will learn to

  • Analyze exposure to security threats and protect the organization's systems and data
  • Deploy firewalls and data encryption to minimize threats
  • Assess alternative user and host authentication mechanisms
  • Manage risks emanating from inside the organization and from the Internet
  • Understand the concepts and foundations of computer security, and identify vulnerabilities of IT systems.
  • Use basic security tools to enhance system security.
  • Develop basic security enhancements in stand-alone applications.

Students will also learn

  • Extensive, detailed and critical understanding of the concepts, issues, principles and theories of computer network security
  • Detailed and practical understanding of formalisms for specifying security related properties and validating them using model checking
  • Critical theoretical and detailed practical knowledge of a range of computer network security technologies as well as network security tools and services
  • Practical experience of analyzing, designing, implementing and validating solutions to computer network security challenges using common network security tools and formal methods.

Security Analyst

This course teaches the fundamental principles of information and systems security. It explores a wide range of security technologies, examines security standards and expectations, and explains techniques for the evaluation of security requirements and solutions. It places theoretical work on protocol design, cryptography, and information flow firmly in the context of existing and emerging practice, with an emphasis upon integration and usability.

Prerequisites: Application/Database/Systems/Network administration

Course Goals and Learning Objectives

Students will also learn

  • understand the main issues in computer and information security;
  • have practical experience in the analysis of secure communication protocols;
  • have an overview of the scope of the current leading technologies and standards;
  • be able to evaluate security solutions.
  • Office Manager Package

    This course gives hands on knowledge of the office management cycle including book keeping, accounting...

    › read more
  • Business Accounting / Book Keeping

    This course gives hands on knowledge of the accounting cycle including recording and analyzing accounting...

    › read more
  • Business Office Admin Specialist

    This Program prepares the participants users for basic administrative jobs in all fields of Office Admin and Data entry ...

    › read more
  • Project Management Professional ( PMP)

    This course gives hands on knowledge of the project management cycle from analyzing business structure ...

    › read more
  • Certified Clinical Medical Assistant

    A medical assistant performs routine administrative and clinical duties in medical offices ...

    › read more
  • Certified Medical Administrative Assistant

    Medical administrative assistants are responsible for a wide range of secretarial tasks to ensure the office...

    › read more
  • Certified Medical Coder ( ICD-10)

    ICD – 10 is a medical classification list by the World Health Organization which codes for diseases, signs, symptoms...

    › read more
  • Electronic Medical Records Specialist

    An electronic health records specialist is responsible for protecting the privacy and security of patient information....

    › read more
  • Certified Phlebotomy Technician

    A phlebotomy technician is responsible for drawing blood from patients and preparing it for further testing. This course...

    › read more
  • EKG Technician

    An EKG technician is responsible for monitoring and recording electical impulses transmitted by the heart...

    › read more
  • Web Development

    • Web pages design
    • Web development
    • Portal integration...
    › read more
  • Cyber Security (IT Security Management)

    Understand and think like the attacker – the methods and tools they will use to attack the application being designed...

    › read more