Loading...

Short Term Course : NIELIT Calicut

Participants Details

# Name Gender Organization/Institute Name
1 Abhay Male
2 Abin .K.P Male
3 Abin Kumar Pk Male
4 Akhil Lal .K.A Male
5 Akhil.P Male
6 Akhila P Female
7 Amaljith Kariyakottil Male
8 Anandhu Chandran .E Male
9 Anisha M Female
10 Anju Ct Female
11 Anoop .P.P Male
12 Anoopa.K Female
13 Aparna .K.P Female
14 Arjun Babauraj Male
15 Arjun Balan Male
16 Arshin E Male
17 Arunlal K Male
18 Aswathy P Female
19 Aswin K Male
20 Aswin K P Male
21 Athul .N.P Male
22 Athul Krishna Mk Male
23 Bensi Lal .P Male
24 Bibinrag K Male
25 Dhaneesh Bhaskaran Male
26 Dhanesh .P Male
27 Divya Pm Female
28 Febin Male
29 Jideesh .M Male
30 Jithesh .M.P Male
31 Midhun .C Male
32 Nideesh .P Male
33 Nidheesh Ct Male
34 Nidheesh K Male
35 Nidhin .K.K Male
36 Nimisha K Female
37 Nisha Pk Female
38 Nithin Ac Male
39 Praveen C Male
40 Ragul K Male
41 Rajitha Pk Female
42 Riju Nk Male
43 Rishin Pm Male
44 Sachin M Male
45 Sajith .V Male
46 Samasya M Female
47 Shimna P Female
48 Sindhu T Female
49 Sreenish Pookodan Male
50 Sudeeshkumar Kp Male
51 Sujin A K Male
52 Umesh .P Male
53 Vidya P Female
54 Vishanth Kp Male
55 Akshay C K Male
56 Anagha A P Female
57 Anagha S R Female
58 Angitha P T Female
59 Anjusha C K Female
60 Chandini K Female
61 Dhanya M Female
62 Greeshma G M Female
63 Jithin T M Male
64 Jonisha Avinash Female
65 Lithu K Female
66 Mahesh M Male
67 Prajeena C Female
68 Praleeb A K Male
69 Pranisha V K Female
70 Prinesh M Male
71 Rajila P Female
72 Ranjini P Female
73 Sachinlal V Male
74 Sajani C Female
75 Saranya M P Female
76 Shavya P Female

Event Details

 

  1. Introduction to Information Security
    1. Attributes of Information Security: Confidentiality, Integrity, and Availability.
    2. Threats & Vulnerabilities: Unauthorized Access, Impersonation, Denial of Service
 
  1. Identification & Authentication
    1. Definitions, Types of authentication, Password Authentication,
    2. Password Vulnerabilities & Attacks: Brute Force & Dictionary Attacks.
    3. Single Sign-on – Kerberos
 
  1. Access Control
    1. Access Control Techniques: Mandatory Access Control, Discretionary Access Control, Access Control Lists, Role Based Access Control.
 
  1. Public Key Infrastructure & Message Authentication
    1. Public Key Cryptography Principles & Applications, Algorithms: RSA, One way Hash Functions, MD5.
 
  1. Firewalls & Intrusion Detection Systems   
    1. Types of Firewalls: Packet Filtering Router, Application Level Gateway or Proxy, Content Filters, Bastion Host.
    2. Intrusion Detection Systems: Components of an IDS, Placement of IDS Components.

Subject :
Course on Information Security
Start :
06-Mar-2017
End :
06-Mar-2017
Venue :
NIELIT Calicut
Registration Status :
0

Workshop / Event co-ordinator Detail

Name :
Course on Information Security
Mobile :
9400055757
Email :
munivel@nielit.gov.in

Style Switcher

Predefined Colors

Layout Style

Header Color

Footer Top Color

Footer Bottom Color