Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction – What Is Security?
- Fundamental definitions and how to think about security.
- Attacker profiles: who might want to attack us and why.
- Basic risk management: what to protect first.
- Threat and vulnerability assessment.
- Sources of best practices and recommendations.
Basic Mechanisms for Confidentiality and Integrity
- Encryption – key algorithms, where they are used, and what they offer.
- Cryptographic attacks – which algorithms to avoid and why.
- Data integrity – how to protect information from unauthorised modification.
- Certificates and Public Key Infrastructure (PKI).
- Man-in-the-middle attacks.
- Secure password storage.
- Password cracking and user database leaks – what is involved?
Network Security Services
- The AAA model.
- Authentication and authorisation protocols (RADIUS, TACACS, Kerberos).
- IEEE 802.1x – user and device authentication.
- Protection of services in local networks (DHCP Snooping, Dynamic ARP Inspection).
Security Systems
- Firewalls – types, operating methods, and configuration.
- Intrusion Prevention/Detection Systems (IPS/IDS).
- Data Loss Prevention (DLP).
- Event logging systems.
Wireless Networks
- WEP, WPA, WPS – what do these mean?
- Hacking attempts – what can be achieved with intercepted traffic.
Building a Wide Area Network – Connecting Branches
- Traffic tunnelling protocols – fundamentals.
- VPN tunnels – types (site-to-site and remote access).
- Corporate versus public VPN networks – what's the difference?
- Security issues – which solutions to avoid.
Security Testing
- Penetration testing – what does it involve?
- Network scanning and vulnerability detection.
- Simulated network attacks.
Requirements
- Knowledge of fundamental computer networking concepts (IP addressing, Ethernet, basic services such as DNS and DHCP).
- Familiarity with Windows and Linux operating systems (basic administration, terminal usage).
Target Audience
- Personnel responsible for network and service security.
- Network and system administrators seeking to learn about security systems.
- Anyone interested in the subject.
28 Hours
Testimonials (1)
The trainer had an excellent knowledge of fortigate and delivered the content very well. Thanks a lot to Soroush.