Get in Touch

Course Outline

Networking Overview & Internet Architecture

  • TCP/IP and OSI models, routing protocols (BGP, OSPF, EIGRP), DNS, DHCP, NAT
  • Security implications: ARP spoofing, DNS tunneling, route hijacking, and DHCP starvation
  • Fundamentals of network traffic analysis and establishing baselines
  • Lab 1:Packet capture analysis, topology mapping, and identifying suspicious routing or DNS activity

Modern Network Solutions & Physical Implementation

  • Software-Defined Networking (SDN), Network Function Virtualization (NFV), Zero Trust architecture
  • Next-generation firewalls, micro-segmentation, and ingress/egress traffic controls
  • Fibre optic infrastructure: optical security, risks of physical layer tapping, and media attenuation monitoring
  • Lab 2:Designing secure network segmentation with policy-driven access controls and mapping physical media risks

Virtualization, Cloud Computing & IaaS Security

  • Hypervisor types (Type 1/2), VM escape vectors, hyperjacking, and hypervisor hardening
  • Cloud IaaS security models (AWS/Azure/GCP), identity and access management, security groups, and compliance boundaries
  • Shared responsibility framework, misconfiguration detection, and cloud-native encryption (at-rest and in-transit)
  • Lab 3:Assessing cloud security posture, mapping IAM roles, and detecting common IaaS vulnerabilities

Clustering, High Availability & IoT Security

  • Load balancers, failover clusters, distributed consensus, and quorum risks
  • IoT architecture, edge computing threats, firmware vulnerabilities, and protocol hardening (MQTT, CoAP, Zigbee, LoRaWAN)
  • Device authentication, secure boot, and supply chain integrity for edge deployments
  • Lab 4:Simulating cluster failover, enumerating IoT devices, and designing secure provisioning workflows

Cryptography, Web Service Security & Recent Vulnerabilities

  • Symmetric and asymmetric encryption, key management, PKI, and certificate validation
  • TLS/SSL handoffs, cipher suite hardening, and certificate pinning
  • Web service security: OAuth2, JWT, API gateways, WAF rules, and rate limiting
  • Recent cryptographic attacks and CVEs: side-channel exploits, quantum threats, ROCA, Heartbleed, and implementation flaws
  • Lab 5:Conducting TLS configuration audits, API security testing, and vulnerability correlation exercises

Future Implementation, Risk Assessment & Capstone

  • Emerging ICT trends: AI/ML in threat detection, SASE, 5G/6G network slicing risks, and edge-to-cloud convergence
  • Risk assessment methodologies: NIST CSF, ISO 27001, threat modeling (STRIDE), and risk treatment planning
  • Capstone:Designing a secure, modern ICT architecture; conducting a risk assessment; and presenting mitigation strategies
  • Course wrap-up, Q&A, and guidance on assessment preparation

Requirements

Professional experience within an IT or IT-related role.

Fundamental knowledge of networking and the internet.

 7 Hours

Number of participants


Price per participant

Provisional Upcoming Courses (Require 5+ participants)

Related Categories