Get in Touch

Course Outline

Introduction – What is security?

  • Key definitions and how to think about security
  • Attacker profiles – who might want to attack us and why
  • Basic risk management – what to secure first
  • Threat and vulnerability assessment
  • Sources of best practices and recommendations

Fundamental mechanisms for confidentiality and integrity

  • Encryption – basic algorithms, where they are used and what they offer
  • Cryptographic attacks – which algorithms to avoid and why
  • Integrity – how to protect data against modification
  • Certificates and Public Key Infrastructure (PKI)
  • Man-in-the-middle attacks
  • Secure password storage
  • Password cracking and user database breaches – what is the issue here?

Network security services

  • AAA model
  • Authentication and authorization protocols (RADIUS, TACACS, Kerberos)
  • IEEE 802.1x – user and device authentication
  • Protection of services in local networks (DHCP Snooping, Dynamic ARP Inspection)

Security systems

  • Firewalls – types, operating methods, configuration
  • Intrusion Prevention Systems (IPS/IDS)
  • Data Loss Prevention (DLP)
  • Event logging systems

Wireless networks

  • WEP, WPA, WPS – what is the issue here?
  • Hacking attempt – what can be achieved with captured traffic

Building a wide area network – connecting branches

  • Packet tunneling protocols – basics
  • VPN tunnels – types (site-to-site and remote access)
  • Corporate vs. public VPNs – what is the issue here?
  • Security issues – which solutions to avoid

Security testing

  • Penetration testing – what is the issue here?
  • Network scanning and vulnerability detection
  • Network attack simulation

Requirements

  • Knowledge of fundamental networking topics
    (IP addressing, Ethernet, basic services – DNS, DHCP)
  • Familiarity with Windows and Linux operating systems (basic administration, system terminal)

Audience

  • Individuals responsible for network and service security,
  • Network and system administrators who wish to learn about security systems,
  • Anyone interested in the topic.
 28 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories