Security Support

About the Course/Course Objective

Who is an IT Security Support Technician ?
IT Security Support Technician is the one who can:
• Identify, diagnose, troubleshoot, resolve internet & intranet security related issues
• Monitor and maintain the uptime of various types of network security devices such as:
o Antivirus server and clients
o Hardware and software Firewalls
o Intrusion detection and Prevention Systems
o Wi-Fi Access points

What does an IT Security Support Technician do?
Using Basic knowledge about viruses, malwares, spyware, cyber security policies, etc. he/she can perform following functions:
• Diagnosing and resolving the basic IT security related problems
• Primary level of fault finding and take necessary actions
• Installing and Configuring antivirus software & its update
• Installing and configuring windows firewalls
• Configuring secure remote access
• Configuring & maintaining a secure Wi-Fi network


Skills: Using Antivirus Software, Antispam Technologies, Configuring Windows Firewall, Firewalls ,Proxy server and routers, MAC Address Filtering, Network Address Translation, Secure Remote Access, Authentication and Encryption, Man in the Middle of Attack, Denial of Service Attack, Using network packet capturing tool

Tools: Open source antivirus, Antispyware, Windows firewall, Wifi security settings, Antispam settings

Detailed Syllabus:

Security Support

Removing Viruses and Malwares
1.Using Antivirus Software
2.Adware’s and Spywares
3.Antispam Technologies
4.Installing Free Antivirus and Scanning the PC
5.Installing Free Antispyware and scanning Pc for Adware and Spywares

Securing LAN
2.Proxy server
4.Configuring Windows Firewall
5.Overview of IPS and IDS
6.Securing Servers - Server Hardening
7.Windows Server Hardening

Securing Wi-Fi Network
1.WEP, WPA and WPA2
2.MAC Address Filtering

Network Access Security
1.Authentication and Encryption
2.Network Address Translation
3.Secure Remote Access
4.Secure Remote Access - Configuring VPN in Windows 7

Cyber Attacks
1.Common Cyber Attack
2.Man in the Middle Attack
3.Denial of Service Attack
4.Using network packet capturing tool