Loading...

Short Term Course : NIELIT Calicut

Participants Details

# Name Gender Organization/Institute Name
1 Yatheendran P Male
2 Balan A M Male
3 Sundharan K Male
4 Krishnan Kutty Male
5 Babu Pm Male
6 Sivadasan Male
7 Shaji M K Male
8 Sadanandan Mk Male
9 Rajan Km Male
10 Ramadasan Chennamkunnath Male
11 Kuttayi P M Male
12 Karunakaran Male
13 Karunakaran Ak Male
14 Babu A C Male
15 Balakrishnan N Male
16 Vasu Mm Male
17 Krishnan Kutty C Male
18 Raman Kutty Male
19 Mohan T Male
20 Venu K Male
21 Kelukutty Male
22 Gurudevan Male
23 Sijimon K K Male
24 Rajan Mm Male
25 Suresh O K Male
26 Gopalan K Male
27 Rajan A M Male
28 Dhamodaran Mt Male
29 Gopalan Male
30 Gopi Male
31 Krishnan Male
32 Kannanchathan Male
33 Krishnan Vt Male
34 Sami Kutty Male
35 Sreejith A R Male
36 Ratheesh T P Male
37 Rajan P Male
38 Chandran K P Male
39 Ayyappan P Male
40 Bhaskaran Male
41 Suresh K Male
42 Sivadasan P C Male
43 Gopalan Male
44 Gokulan Male
45 Subheesh V K Male
46 Sreedharan V P Male
47 Preman V T Male
48 Cheriyekkan P Male
49 Abhishek.V.P Male
50 Abin.K.B Male
51 Abina.Pk Female
52 Ajanya.O.P Female
53 Akhila K.S Female
54 Akhila T Female
55 Akshaydas.M.M Female
56 Anusree K.P Female
57 Arya Tp Female
58 Ashak Sasi Female
59 Ashwin K Male
60 Aswathi P Female
61 Bijith P Male
62 Dhanapriya M Female
63 Jibin Mt Male
64 Jinsha K Female
65 Jisha.C.K Female
66 Maneesh.T Male
67 Mikhila Ms Female
68 Nidhun Lal K Male
69 Preeja P Female
70 Reethu P Female
71 Reshma K Female
72 Riju.C.K Female
73 Roshni A P Female
74 Sachin M Male
75 Sanjay P T Male
76 Shayana M Female
77 Shibin.V Male
78 Sonu.T Female
79 Soubhaghya.M.P Female
80 Sreeshma V Female
81 Sunisha V P Female
82 Syam Mt Male
83 Thushara T K Female
84 Vignesh T Male
85 Vijila T Female
86 Vijillal. M Female
87 Vijina.T Female
88 Vishnu.K.M Female

Event Details

  1. Introduction to Information Security
    1. Attributes of Information Security: Confidentiality, Integrity, and Availability.
    2. Threats & Vulnerabilities: Unauthorized Access, Impersonation, Denial of Service
 
  1. Identification & Authentication
    1. Definitions, Types of authentication, Password Authentication,
    2. Password Vulnerabilities & Attacks: Brute Force & Dictionary Attacks.
    3. Single Sign-on – Kerberos
 
  1. Access Control
    1. Access Control Techniques: Mandatory Access Control, Discretionary Access Control, Access Control Lists, Role Based Access Control.
 
  1. Public Key Infrastructure & Message Authentication
    1. Public Key Cryptography Principles & Applications, Algorithms: RSA, One way Hash Functions, MD5.
 
  1. Firewalls & Intrusion Detection Systems   
    1. Types of Firewalls: Packet Filtering Router, Application Level Gateway or Proxy, Content Filters, Bastion Host.
    2. Intrusion Detection Systems: Components of an IDS, Placement of IDS Components.

Subject :
Training on Network and System Security
Start :
11-Sep-2017
End :
11-Sep-2017
Venue :
NIELIT Calicut
Registration Status :
0

Workshop / Event co-ordinator Detail

Name :
Training on Network and System Security
Mobile :
9400055757
Email :
munivel@nielit.gov.in

Style Switcher

Predefined Colors

Layout Style

Header Color

Footer Top Color

Footer Bottom Color