Get in Touch

Course Outline

Introduction – What Is Security?

  • Fundamental definitions and how to think about security.
  • Attacker profiles: who might want to attack us and why.
  • Basic risk management: what to protect first.
  • Threat and vulnerability assessment.
  • Sources of best practices and recommendations.

Basic Mechanisms for Confidentiality and Integrity

  • Encryption – key algorithms, where they are used, and what they offer.
  • Cryptographic attacks – which algorithms to avoid and why.
  • Data integrity – how to protect information from unauthorised modification.
  • Certificates and Public Key Infrastructure (PKI).
  • Man-in-the-middle attacks.
  • Secure password storage.
  • Password cracking and user database leaks – what is involved?

Network Security Services

  • The AAA model.
  • Authentication and authorisation protocols (RADIUS, TACACS, Kerberos).
  • IEEE 802.1x – user and device authentication.
  • Protection of services in local networks (DHCP Snooping, Dynamic ARP Inspection).

Security Systems

  • Firewalls – types, operating methods, and configuration.
  • Intrusion Prevention/Detection Systems (IPS/IDS).
  • Data Loss Prevention (DLP).
  • Event logging systems.

Wireless Networks

  • WEP, WPA, WPS – what do these mean?
  • Hacking attempts – what can be achieved with intercepted traffic.

Building a Wide Area Network – Connecting Branches

  • Traffic tunnelling protocols – fundamentals.
  • VPN tunnels – types (site-to-site and remote access).
  • Corporate versus public VPN networks – what's the difference?
  • Security issues – which solutions to avoid.

Security Testing

  • Penetration testing – what does it involve?
  • Network scanning and vulnerability detection.
  • Simulated network attacks.

Requirements

  • Knowledge of fundamental computer networking concepts (IP addressing, Ethernet, basic services such as DNS and DHCP).
  • Familiarity with Windows and Linux operating systems (basic administration, terminal usage).

Target Audience

  • Personnel responsible for network and service security.
  • Network and system administrators seeking to learn about security systems.
  • Anyone interested in the subject.
 28 Hours

Number of participants


Price per participant

Testimonials (1)

Provisional Upcoming Courses (Require 5+ participants)

Related Categories