Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Networking Overview & Internet Architecture
- TCP/IP and OSI models, routing protocols (BGP, OSPF, EIGRP), DNS, DHCP, NAT
- Security implications: ARP spoofing, DNS tunneling, route hijacking, and DHCP starvation
- Fundamentals of network traffic analysis and establishing baselines
- Lab 1:Packet capture analysis, topology mapping, and identifying suspicious routing or DNS activity
Modern Network Solutions & Physical Implementation
- Software-Defined Networking (SDN), Network Function Virtualization (NFV), Zero Trust architecture
- Next-generation firewalls, micro-segmentation, and ingress/egress traffic controls
- Fibre optic infrastructure: optical security, risks of physical layer tapping, and media attenuation monitoring
- Lab 2:Designing secure network segmentation with policy-driven access controls and mapping physical media risks
Virtualization, Cloud Computing & IaaS Security
- Hypervisor types (Type 1/2), VM escape vectors, hyperjacking, and hypervisor hardening
- Cloud IaaS security models (AWS/Azure/GCP), identity and access management, security groups, and compliance boundaries
- Shared responsibility framework, misconfiguration detection, and cloud-native encryption (at-rest and in-transit)
- Lab 3:Assessing cloud security posture, mapping IAM roles, and detecting common IaaS vulnerabilities
Clustering, High Availability & IoT Security
- Load balancers, failover clusters, distributed consensus, and quorum risks
- IoT architecture, edge computing threats, firmware vulnerabilities, and protocol hardening (MQTT, CoAP, Zigbee, LoRaWAN)
- Device authentication, secure boot, and supply chain integrity for edge deployments
- Lab 4:Simulating cluster failover, enumerating IoT devices, and designing secure provisioning workflows
Cryptography, Web Service Security & Recent Vulnerabilities
- Symmetric and asymmetric encryption, key management, PKI, and certificate validation
- TLS/SSL handoffs, cipher suite hardening, and certificate pinning
- Web service security: OAuth2, JWT, API gateways, WAF rules, and rate limiting
- Recent cryptographic attacks and CVEs: side-channel exploits, quantum threats, ROCA, Heartbleed, and implementation flaws
- Lab 5:Conducting TLS configuration audits, API security testing, and vulnerability correlation exercises
Future Implementation, Risk Assessment & Capstone
- Emerging ICT trends: AI/ML in threat detection, SASE, 5G/6G network slicing risks, and edge-to-cloud convergence
- Risk assessment methodologies: NIST CSF, ISO 27001, threat modeling (STRIDE), and risk treatment planning
- Capstone:Designing a secure, modern ICT architecture; conducting a risk assessment; and presenting mitigation strategies
- Course wrap-up, Q&A, and guidance on assessment preparation
Requirements
Professional experience within an IT or IT-related role.
Fundamental knowledge of networking and the internet.
7 Hours