Get in Touch

Course Outline

Introduction – What Is Security?

  • Key basic definitions and how to think about security
  • Attacker profiles: who might want to attack us and why
  • Basic risk management: what to secure first
  • Threat and vulnerability assessment
  • Sources of best practices and recommendations

Fundamental Mechanisms for Confidentiality and Integrity

  • Encryption – basic algorithms, where they are used, and what they provide
  • Cryptographic attacks – which algorithms to avoid and why
  • Integrity – how to protect data from modification
  • Certificates and Public Key Infrastructure (PKI)
  • Man-in-the-middle attacks
  • Secure password storage
  • Password cracking and user database breaches – what it all means?

Network Security Services

  • AAA model
  • Authentication and authorization protocols (RADIUS, TACACS, Kerberos)
  • IEEE 802.1x – user and device authentication
  • Protection of services in local networks (DHCP Snooping, Dynamic ARP Inspection)

Security Systems

  • Firewalls – types, operation methods, configuration
  • Intrusion Prevention Systems (IPS/IDS)
  • Data Loss Prevention (DLP)
  • Event logging systems

Wireless Networks

  • WEP, WPA, WPS – what they are and how they work
  • Attempting intrusion: what can be achieved with intercepted traffic

Building Wide Area Networks – Connecting Branches

  • Traffic tunneling protocols – basics
  • VPN tunnels – types (site-to-site and remote access)
  • Corporate vs. public VPN networks – key differences
  • Security issues – which solutions to avoid

Security Testing

  • Penetration testing – what it involves
  • Network scanning and vulnerability detection
  • Simulated network attacks

Requirements

  • Basic knowledge of computer networking concepts (IP addressing, Ethernet, fundamental services such as DNS and DHCP)
  • Familiarity with Windows and Linux operating systems (basic administration, terminal usage)

Target Audience

  • Individuals responsible for network and service security,
  • Network and system administrators seeking to learn about security systems,
  • Anyone interested in the subject.
 28 Hours

Testimonials (1)

Related Categories