Network & Security professionals work in various highly rewarding roles. In this course, you’ll learn how to design and create websites.

Duration: 12 weeks

Intakes: Jan,April,July,Oct

NETWORK SECURITY

Network security consists of the policies and practices adopted to prevent and monitor unauthorized access. Network security consists of the policies and practices
monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.

Network security covers a variety of computer networks, both public and private, that are used in everyday jobs; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access.

Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: it secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

At Techsavanna Institute of Technology (TIT), will be offering the below for both entry , intermediate and expert level.

  •  Ethical Hacking.
  •  Network Security.
  •  IT Network Fundamentals.
  •  Deep Web.

Cyber Security.

  •  Penetration Testing.
  •  KALI Linux.

Fees: KES 70,000

INTAKE: MONTHLY INTAKE

Course Topics for Network & Security Prep (12 Weeks)

The 12 Weeks Network & Security Program will be offering the below for both entry, intermediate and expert level.In this class you will learn:

Network Security (Duration: 12 Weeks):

NETWORK AND CYBER SECURITY -COURSE OUTLINE

1 Introduction to Computer Networking and Security:
Computer Crime, Security and Computer Viruses
Ch.1 – Introduction
2 Introduction to Computer Networking and Security:
3 Cryptography:
Ch.2 – Conventional Encryption and Message Confidentiality

4

 

5.

 

Cryptography: Types

 

Ch.3 – Public-Key Cryptography and Message Authentication

6 Network Security Applications: Ch. 4 – Authentication Applications
7 Network Security Applications: Ch.5 – Electronic Mail Security
8 Network Security Applications: Ch.6 – IP Security
9 Network Security Applications: Ch.7 – Web Security
10 Ch.8 – Network Management Security
11. System Security: Ch.9 – Intruders and Viruses
System Security: Ch.10 – Firewalls
12.                Concepts of Certified Ethical Hacking
13.              Practical Test
Apply Now

Network & Security professionals work in various highly rewarding roles. In this course, you’ll learn how to design and create websites.

Duration: 12 weeks

Intakes: Jan,April,July,Oct

Overview

NETWORK SECURITY

Network security consists of the policies and practices adopted to prevent and monitor unauthorized access. Network security consists of the policies and practices
monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources.

Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority.

Network security covers a variety of computer networks, both public and private, that are used in everyday jobs; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access.

Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: it secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.

At Techsavanna Institute of Technology (TIT), will be offering the below for both entry , intermediate and expert level.

  •  Ethical Hacking.
  •  Network Security.
  •  IT Network Fundamentals.
  •  Deep Web.

Cyber Security.

  •  Penetration Testing.
  •  KALI Linux.

Fees: KES 70,000

INTAKE: MONTHLY INTAKE

Curriculum

Course Topics for Network & Security Prep (12 Weeks)

The 12 Weeks Network & Security Program will be offering the below for both entry, intermediate and expert level.In this class you will learn:

Network Security (Duration: 12 Weeks):

NETWORK AND CYBER SECURITY -COURSE OUTLINE

1 Introduction to Computer Networking and Security:
Computer Crime, Security and Computer Viruses
Ch.1 – Introduction
2 Introduction to Computer Networking and Security:
3 Cryptography:
Ch.2 – Conventional Encryption and Message Confidentiality

4

 

5.

 

Cryptography: Types

 

Ch.3 – Public-Key Cryptography and Message Authentication

6 Network Security Applications: Ch. 4 – Authentication Applications
7 Network Security Applications: Ch.5 – Electronic Mail Security
8 Network Security Applications: Ch.6 – IP Security
9 Network Security Applications: Ch.7 – Web Security
10 Ch.8 – Network Management Security
11. System Security: Ch.9 – Intruders and Viruses
System Security: Ch.10 – Firewalls
12.                Concepts of Certified Ethical Hacking
13.              Practical Test