Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Network Security
- TCP/IP protocol vulnerabilities: TCP, UDP, HTTP, ARP, ICMP, DHCP, DNS
- Impact of network addressing on security: IPv4 and IPv6 addresses, MAC addresses, network segmentation, CIDR notation, NAT, and distinctions between public and private networks
- Network infrastructure and technologies: Network security architecture, DMZ, virtualization, cloud computing, honeypots, proxy servers, IDS, IPS
- Securing small office/home office (SoHo) wireless networks: MAC address filtering, encryption standards and protocols, SSID
- Cryptography: CIA triad, Hashes, PKI
- Secure access technologies: tunneling, VPN, NAC, load balancing
- Types of security data: alerts, session and transaction data, full packet capture, statistical data
- Logs: Syslog, SIEM, and log collection
- Evaluating alerts: rules and alert generation, analysis tools, Security Onion
Endpoint Security Concepts
- Operating system security concepts: Windows update management, local security policy, Windows Defender Firewall
- Linux server administration: filtering rules, service configuration files, device hardening, service logs
- System logs: Event Viewer, audit logs, system and application logs, Syslog, and anomaly identification
- Malware removal: system scanning, reviewing scan logs, malware remediation, host-based Intrusion Prevention
- Application security: block lists, allow lists, sandboxing
Cyber Threat Management
- Network Security Testing: vulnerability scanners, security automation, techniques, and tools
- Threat Intelligence: standards, CVE database, intelligence platforms
- Vulnerability assessment: network and server profiling, CVSS
- Risk Management, Assessment, and Security controls
- Digital Forensics, Incident Analysis, and Response
- Disaster Recovery
Requirements
- Prior experience in Cybersecurity.
21 Hours
Testimonials (3)
Experience sharing, it's teacher's know-how and valuable.
Carey Fan - Logitech
Course - C/C++ Secure Coding
get to understand more about the product and some key differences between RHDS and open source OpenLDAP.
Jackie Xie - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
the knowledge of the trainer was very high - he knew what he was talking about, and knew the answers to our questions