Get in Touch

Course Outline

Network Security

  • TCP/IP protocol vulnerabilities: TCP, UDP, HTTP, ARP, ICMP, DHCP, DNS
  • Impact of network addressing on security: IPv4 and IPv6 addresses, MAC addresses, network segmentation, CIDR notation, NAT, and distinctions between public and private networks
  • Network infrastructure and technologies: Network security architecture, DMZ, virtualization, cloud computing, honeypots, proxy servers, IDS, IPS
  • Securing small office/home office (SoHo) wireless networks: MAC address filtering, encryption standards and protocols, SSID
  • Cryptography: CIA triad, Hashes, PKI
  • Secure access technologies: tunneling, VPN, NAC, load balancing
  • Types of security data: alerts, session and transaction data, full packet capture, statistical data
  • Logs: Syslog, SIEM, and log collection
  • Evaluating alerts: rules and alert generation, analysis tools, Security Onion

Endpoint Security Concepts

  • Operating system security concepts: Windows update management, local security policy, Windows Defender Firewall
  • Linux server administration: filtering rules, service configuration files, device hardening, service logs
  • System logs: Event Viewer, audit logs, system and application logs, Syslog, and anomaly identification
  • Malware removal: system scanning, reviewing scan logs, malware remediation, host-based Intrusion Prevention
  • Application security: block lists, allow lists, sandboxing

Cyber Threat Management

  • Network Security Testing: vulnerability scanners, security automation, techniques, and tools
  • Threat Intelligence: standards, CVE database, intelligence platforms
  • Vulnerability assessment: network and server profiling, CVSS
  • Risk Management, Assessment, and Security controls
  • Digital Forensics, Incident Analysis, and Response
  • Disaster Recovery

Requirements

  • Prior experience in Cybersecurity.
 21 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories