Get in Touch

Course Outline

Network Security

  • Protocol vulnerabilities in TCP/IP: TCP, UDP, HTTP, ARP, ICMP, DHCP, DNS
  • The role of network addresses in security: IPv4 and IPv6 addressing, MAC addresses, network segmentation, CIDR notation, NAT, and public versus private networks
  • Network infrastructure and technologies: Security architecture, DMZ, virtualization, cloud environments, honeypots, proxy servers, IDS, IPS
  • Securing wireless SoHo networks: MAC address filtering, encryption standards and protocols, SSID
  • Cryptography: CIA triad, Hashes, PKI
  • Secure access technologies: tunneling, VPN, NAC, load balancing
  • Types of security data: alerts, session and transaction data, full packet capture, statistical data
  • Logging: Syslog, SIEM, and log collection
  • Evaluating alerts: rules and alerting mechanisms, analysis tools, Security Onion

Endpoint Security Concepts

  • Operating system security principles: Windows update management, local security policy, Windows Defender Firewall
  • Linux server administration: filtering rules, service configuration files, device hardening, service logs
  • System logs: Event Viewer, audit logs, system and application logs, syslog, anomaly identification
  • Malware removal: system scanning, review of scan logs, malware remediation, host-based Intrusion Prevention
  • Application security: block lists, allow lists, sandboxing

Cyber Threat Management

  • Network Security Testing: vulnerability scanners, security automation, techniques, tools
  • Threat Intelligence: standards, CVE database, intelligence platforms
  • Vulnerability assessment: network and server profiling, CVSS
  • Risk Management, Assessment, and Security controls
  • Digital Forensics, Incident Analysis, and Response
  • Disaster Recovery

Requirements

  • Prior experience in Cybersecurity
 21 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories