Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Network Security
- Protocol vulnerabilities in TCP/IP: TCP, UDP, HTTP, ARP, ICMP, DHCP, DNS
- The role of network addresses in security: IPv4 and IPv6 addressing, MAC addresses, network segmentation, CIDR notation, NAT, and public versus private networks
- Network infrastructure and technologies: Security architecture, DMZ, virtualization, cloud environments, honeypots, proxy servers, IDS, IPS
- Securing wireless SoHo networks: MAC address filtering, encryption standards and protocols, SSID
- Cryptography: CIA triad, Hashes, PKI
- Secure access technologies: tunneling, VPN, NAC, load balancing
- Types of security data: alerts, session and transaction data, full packet capture, statistical data
- Logging: Syslog, SIEM, and log collection
- Evaluating alerts: rules and alerting mechanisms, analysis tools, Security Onion
Endpoint Security Concepts
- Operating system security principles: Windows update management, local security policy, Windows Defender Firewall
- Linux server administration: filtering rules, service configuration files, device hardening, service logs
- System logs: Event Viewer, audit logs, system and application logs, syslog, anomaly identification
- Malware removal: system scanning, review of scan logs, malware remediation, host-based Intrusion Prevention
- Application security: block lists, allow lists, sandboxing
Cyber Threat Management
- Network Security Testing: vulnerability scanners, security automation, techniques, tools
- Threat Intelligence: standards, CVE database, intelligence platforms
- Vulnerability assessment: network and server profiling, CVSS
- Risk Management, Assessment, and Security controls
- Digital Forensics, Incident Analysis, and Response
- Disaster Recovery
Requirements
- Prior experience in Cybersecurity
21 Hours
Testimonials (3)
Experience sharing, it's teacher's know-how and valuable.
Carey Fan - Logitech
Course - C/C++ Secure Coding
get to understand more about the product and some key differences between RHDS and open source OpenLDAP.
Jackie Xie - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
the knowledge of the trainer was very high - he knew what he was talking about, and knew the answers to our questions