Get in Touch

Course Outline

Network Security

  • TCP/IP protocol vulnerabilities: TCP, UDP, HTTP, ARP, ICMP, DHCP, DNS
  • Impact of network addresses on security: IPv4 and IPv6 addresses, MAC addresses, network segmentation, CIDR notation, NAT, public vs. private networks
  • Network infrastructure and technologies: Network security architecture, DMZ, virtualization, cloud, honeypot, proxy server, IDS, IPS
  • Securing wireless SoHo networks: MAC address filtering, encryption standards and protocols, SSID
  • Cryptography: CIA triad, Hashes, PKI
  • Secure access technologies: tunneling, VPN, NAC, load balancing
  • Types of security data: alerts, session and transaction data, full packet capture, statistical data
  • Logs: Syslog, SIEM, and log collection
  • Evaluating alerts: rules and alerts, analysis tools, Security Onion

Endpoint Security Concepts

  • Operating system security concepts: Windows update management, local security policy, Windows Defender Firewall
  • Linux server administration: filtering rules, service configuration files, device hardening, service logs
  • System logs: Event Viewer, audit logs, system and application logs, syslog, identification of anomalies
  • Malware removal: Scanning systems, reviewing scan logs, malware remediation, host-based Intrusion Prevention
  • Application security: block list, allow list, sandboxing

Cyber Threat Management

  • Network Security Testing: vulnerability scanner, security automation, techniques, tools
  • Threat Intelligence: standards, CVE database, Intelligence platforms
  • Vulnerability assessment: network and server profiling, CVSS
  • Risk Management, Assessment, and Security controls
  • Digital Forensics and Incident Analysis and Response
  • Disaster Recovery

Requirements

  • Experience in Cybersecurity
 21 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories