Course Outline

  • IT security and secure coding
  • Network security
  • Practical cryptography
  • Security protocols
  • Cryptographic vulnerabilities
  • Knowledge sources
  14 Hours
 

Testimonials

Related Courses

Cisco CCNA Syllabus in 5 Days

 35 hours

A 5 day practical networking course designed to familiarise students with Cisco IOS (version 12). The course details the key commands used to configure and secure Cisco routers and switches, and covers the CCNA syllabus - including wired and

Understanding IPSec VPNs

 14 hours

This 2 day course investigates the theory and technology associated with IPSec VPN’s.VPN’s are setup using Cisco IOS Routers and ASA Firewalls using the web interface. The workings of the protocols are examined using debug commands and

Understanding IPv6

 14 hours

A 2 day theoretical course (with some practical demonstrations) covering the fundamentals of Internet Protocol v6 – including addressing, protocol formats, ICMP v6, discovery processes and IP v6 routing. Audience: Network Planners,

Practical TCP/IP

 28 hours

This 4 day course involves a mixture of expository based (utilising protocol analyser traces where appropriate) and practical experiments to test and verify the operation of TCP/IP networks. The major aspects of the TCP/IP protocol stack are

BeyondCorp: Implementing Zero Trust Security

 14 hours

BeyondCorp is an open source Zero Trust security framework that allows employees to work securely from any location without the need for a traditional VPN. In this instructor-led, live training, participants will learn hands-on how to set up a

Certified Lead Ethical Hacker

 35 hours

Why should you attend? The Certified Lead Ethical Hacker training course enables you to develop the necessary expertise to perform information system penetration tests by applying recognized principles, procedures and penetration testing

Certified Network Defender | CND

 35 hours

Certified Network Defender (CND) is a vendor-neutral, hands-on, instructor-led comprehensive network security certification training program. It is a skills-based, lab intensive program based on the security education framework and work role task

Zscaler

 14 hours

Zscaler is a SaaS security platform that provides a fast and secure connection between a user and any application. This instructor-led, live training (online or onsite) is aimed at systems administrators who wish to learn how to use Zscaler to

System and Network Security with FortiGate

 21 hours

FortiGuard Labs is a security and threat intelligence research company by Fortinet, one of the leading cybersecurity service providers today. Among its most notable products are FortiGate next-generation firewalls (NGFWs) that are more efficient

Network Security in Linux

 14 hours

During the course, participants will learn: What is denial of service attacks, Flooding, Sniffing, MIM? How to break from the network to the server? How to watch packets on the network (also running on switches)? Do you watch any

Network Security Administrator

 35 hours

Audience: System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.  

Penetration Testing with Nmap

 14 hours

Nmap is a port scanner used for penetration and network testing. Port scanners such as Nmap, discover vulnerable communications on computer network systems. This instructor-led, live training (online or onsite) is aimed at software testers who

OpenVAS

 14 hours

OpenVAS is an advanced open source framework which consists of several services and tools for network vulnerability scanning and management. In this instructor-led, live training, participants will learn how to use OpenVAS for network

Palo Alto Firewalls

 21 hours

Palo Alto Networks offers a platform that includes advanced firewalls and cloud extension. Palo Alto firewalls prevents malware intrusion with an automated approach that delivers consistent security. This instructor-led, live training (online or

Wireless Network and Telecom Network Security

 35 hours

Wireless and telecom network security refers the practices carried out to safeguard communication devices, terminal equipment, routing equipment, servers and Wireless devices and networks against malicious attacks.  This instructor-led, live