Get in Touch

Course Outline

Network Security

  • TCP/IP protocol vulnerabilities: TCP, UDP, HTTP, ARP, ICMP, DHCP, DNS
  • Impact of network addressing on security: IPv4 and IPv6 addresses, MAC addresses, network segmentation, CIDR notation, NAT, public vs. private networks
  • Network infrastructure and technologies: Security architecture, DMZ, virtualization, cloud computing, honeypots, proxy servers, IDS, IPS
  • Securing SoHo wireless networks: MAC address filtering, encryption standards and protocols, SSID
  • Cryptography: CIA triad, Hashes, PKI
  • Secure access technologies: Tunneling, VPN, NAC, load balancing
  • Types of security data: Alerts, session and transaction data, full packet capture, statistical data
  • Logs: Syslog, SIEM, and log collection
  • Evaluating alerts: Rules and alerts, analysis tools, Security Onion

Endpoint Security Concepts

  • Operating system security concepts: Windows update management, local security policy, Windows Defender Firewall
  • Linux server administration, filtering rules, service configuration files, device hardening, service logs
  • System logs: Event Viewer, audit logs, system and application logs, syslog, anomaly identification
  • Malware removal: System scanning, reviewing scan logs, malware remediation, host-based Intrusion Prevention
  • Application security: Blocklists, allowlists, sandboxing

Cyber Threat Management

  • Network Security Testing: Vulnerability scanners, security automation, techniques, tools
  • Threat Intelligence: Standards, CVE database, intelligence platforms
  • Vulnerability assessment: Network and server profiling, CVSS
  • Risk Management, Assessment, and Security controls
  • Digital Forensics, Incident Analysis, and Response
  • Disaster Recovery

Requirements

  • Prior experience in Cybersecurity.
 21 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories