Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Network Security
- TCP/IP protocol vulnerabilities: TCP, UDP, HTTP, ARP, ICMP, DHCP, DNS
- Impact of network addresses on security: IPv4 and IPv6 addresses, MAC addresses, network segmentation, CIDR notation, NAT, public vs. private networks
- Network infrastructure and technologies: Network security architecture, DMZ, virtualization, cloud, honeypot, proxy server, IDS, IPS
- Securing wireless SoHo networks: MAC address filtering, encryption standards and protocols, SSID
- Cryptography: CIA triad, Hashes, PKI
- Secure access technologies: tunneling, VPN, NAC, load balancing
- Types of security data: alerts, session and transaction data, full packet capture, statistical data
- Logs: Syslog, SIEM, and log collection
- Evaluating alerts: rules and alerts, analysis tools, Security Onion
Endpoint Security Concepts
- Operating system security concepts: Windows update management, local security policy, Windows Defender Firewall
- Linux server administration: filtering rules, service configuration files, device hardening, service logs
- System logs: Event Viewer, audit logs, system and application logs, syslog, identification of anomalies
- Malware removal: Scanning systems, reviewing scan logs, malware remediation, host-based Intrusion Prevention
- Application security: block list, allow list, sandboxing
Cyber Threat Management
- Network Security Testing: vulnerability scanner, security automation, techniques, tools
- Threat Intelligence: standards, CVE database, Intelligence platforms
- Vulnerability assessment: network and server profiling, CVSS
- Risk Management, Assessment, and Security controls
- Digital Forensics and Incident Analysis and Response
- Disaster Recovery
Requirements
- Experience in Cybersecurity
21 Hours
Testimonials (3)
Experience sharing, it's teacher's know-how and valuable.
Carey Fan - Logitech
Course - C/C++ Secure Coding
get to understand more about the product and some key differences between RHDS and open source OpenLDAP.
Jackie Xie - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
the knowledge of the trainer was very high - he knew what he was talking about, and knew the answers to our questions