Get in Touch

Course Outline

Introduction – What is Security?

  • A few basic definitions and how to think about security
  • Attacker profiles – who might want to attack us and why
  • Simple risk management – what to secure first
  • Threat and vulnerability assessment
  • Sources of best practices and recommendations

Fundamental Mechanisms for Confidentiality and Integrity

  • Encryption – basic algorithms, where they are used, and their benefits
  • Cryptographic attacks – which algorithms to avoid and why
  • Integrity – how to protect data from modification
  • Certificates and Public Key Infrastructure (PKI)
  • Man-in-the-middle attacks
  • Secure password storage
  • Password cracking and user database leaks – what is involved?

Network Security Services

  • AAA Model
  • Authentication and Authorization Protocols (RADIUS, TACACS, Kerberos)
  • IEEE 802.1x – User and Device Authentication
  • Protecting Services in Local Networks (DHCP Snooping, Dynamic ARP Inspection)

Security Systems

  • Firewalls – types, operating methods, configuration
  • Intrusion Prevention Systems (IPS/IDS)
  • Data Leak Prevention (DLP)
  • Event Logging Systems

Wireless Networks

  • WEP, WPA, WPS – what is involved?
  • Cracking Attempt – what can be achieved with captured traffic

Building a Wide Area Network – Connecting Branches

  • Tunneling Protocols – Basics
  • VPN Tunnels – Types (site-to-site and remote access)
  • Corporate vs. Public VPNs – What is involved?
  • Security Issues – Which solutions to avoid

Security Testing

  • Penetration Tests – What is involved?
  • Network Scanning and Vulnerability Detection
  • Network Attack Simulation

Requirements

  • Knowledge of fundamental networking concepts (IP addressing, Ethernet, core services – DNS, DHCP)
  • Familiarity with Windows and Linux operating systems (basic administration, system terminal)

Audience

  • Individuals responsible for network and service security,
  • Network and system administrators wishing to learn about security systems,
  • Anyone interested in the topic.
 28 Hours

Testimonials (1)

Upcoming Courses

Related Categories