Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction – What Is Security?
- Key basic definitions and how to think about security
- Attacker profiles: who might want to attack us and why
- Basic risk management: what to secure first
- Threat and vulnerability assessment
- Sources of best practices and recommendations
Fundamental Mechanisms for Confidentiality and Integrity
- Encryption – basic algorithms, where they are used, and what they provide
- Cryptographic attacks – which algorithms to avoid and why
- Integrity – how to protect data from modification
- Certificates and Public Key Infrastructure (PKI)
- Man-in-the-middle attacks
- Secure password storage
- Password cracking and user database breaches – what it all means?
Network Security Services
- AAA model
- Authentication and authorization protocols (RADIUS, TACACS, Kerberos)
- IEEE 802.1x – user and device authentication
- Protection of services in local networks (DHCP Snooping, Dynamic ARP Inspection)
Security Systems
- Firewalls – types, operation methods, configuration
- Intrusion Prevention Systems (IPS/IDS)
- Data Loss Prevention (DLP)
- Event logging systems
Wireless Networks
- WEP, WPA, WPS – what they are and how they work
- Attempting intrusion: what can be achieved with intercepted traffic
Building Wide Area Networks – Connecting Branches
- Traffic tunneling protocols – basics
- VPN tunnels – types (site-to-site and remote access)
- Corporate vs. public VPN networks – key differences
- Security issues – which solutions to avoid
Security Testing
- Penetration testing – what it involves
- Network scanning and vulnerability detection
- Simulated network attacks
Requirements
- Basic knowledge of computer networking concepts (IP addressing, Ethernet, fundamental services such as DNS and DHCP)
- Familiarity with Windows and Linux operating systems (basic administration, terminal usage)
Target Audience
- Individuals responsible for network and service security,
- Network and system administrators seeking to learn about security systems,
- Anyone interested in the subject.
28 Hours
Testimonials (1)
The trainer had an excellent knowledge of fortigate and delivered the content very well. Thanks a lot to Soroush.