Course Outline

Network Security 

  • TCP/IP protocol vulnerabilities: TCP, UDP, HTTP, ARP, ICMP, DHCP, DNS
  • Impact of network addresses for network security: IPv4 and IPv6 addresses, MAC addresses, network segmentation, CIDR notation, NAT, public vs. private networks
  • Network infrastructure and technologies: Network security architecture, DMZ, virtualization, cloud, honeypot, proxy server, IDS, IPS
  • Secure wireless SoHo network: MAC address filtering, encryption standards and protocols, SSID
  • Cryptography: CIA, Hashes, PKI
  • Secure access technologies: tunneling, VPN, NAC, load balancing
  • Types of security data: alert, session and transaction data, full packet capture, statistical data
  • Logs: Syslog, SIEM and log collection
  • Evaluating alerts: rules and alerts, analysis tools, Security Onion

Endpoint security Concepts 

  • Operating system security concepts: Windows update management, local security policy, Windows Defender Firewall
  • Linux server administration, filtering rules, service configuration file, hardening device, service logs
  • System logs: Event Viewer, audit logs, system and application logs, syslog, identification of anomalies
  • Malware removal: Scanning systems, reviewing scan logs, malware remediation, host-based Intrusion Prevention
  • Application security: block list, allow list, sandboxing

Cyber Threat Management 

  • Network Security Testing: vulnerability scanner, security automation, technique, tools
  • Threat Intelligence: standards, CVE database, Intelligence platforms
  • Vulnerability assesment: network and server profiling, CVSS
  • Risk Management, Assesment and Security controls
  • Digital Forensic and Incident Analysys and Response
  • Disaster Recovery

Requirements

  • Experience in Cybersecurity 
 21 Hours

Number of participants



Price per participant

Testimonials (5)

Related Categories