Get in Touch

Course Outline

Introduction – What is Security?

  • Key definitions and how to think about security
  • Attacker profiles – who might want to attack us and why
  • Basic risk management – what to secure first
  • Threat and vulnerability assessment
  • Sources of best practices and recommendations

Fundamental Mechanisms for Confidentiality and Integrity

  • Encryption – basic algorithms, where they are used and what they provide
  • Cryptographic attacks – which algorithms to avoid and why
  • Integrity – how to protect data from modification
  • Certificates and Public Key Infrastructure (PKI)
  • Man-in-the-middle attacks
  • Secure password storage
  • Password cracking and user database leaks – what is behind them?

Security Services in Networks

  • AAA Model
  • Authentication and authorization protocols (RADIUS, TACACS, Kerberos)
  • IEEE 802.1x – authentication of users and devices
  • Protection of services in local networks (DHCP Snooping, Dynamic ARP Inspection)

Security Systems

  • Firewalls – types, operating principles, configuration
  • Intrusion Prevention Systems (IPS/IDS)
  • Data loss prevention (DLP)
  • Event logging systems

Wireless Networks

  • WEP, WPA, WPS – what are they about?
  • Attempted intrusion – what can be achieved from captured traffic

Building Wide-Area Networks – Connecting Branches

  • Tunneling protocols – basics
  • VPN tunnels – types (site-to-site and remote access)
  • Corporate vs. public VPNs – what’s the difference?
  • Security issues – which solutions to avoid

Security Testing

  • Penetration testing – what is it about?
  • Network scanning and vulnerability detection
  • Network attack simulation

Requirements

  • knowledge of fundamental computer networking concepts
    (IP addressing, Ethernet, basic services – DNS, DHCP)
  • knowledge of Windows and Linux operating systems (basic administration, terminal usage)

Audience

  • individuals responsible for network and service security,
  • network and system administrators wishing to learn about security systems,
  • anyone interested in the subject.
 28 Hours

Custom Corporate Training

Training solutions designed exclusively for businesses.

  • Customized Content: We adapt the syllabus and practical exercises to the real goals and needs of your project.
  • Flexible Schedule: Dates and times adapted to your team's agenda.
  • Format: Online (live), In-company (at your offices), or Hybrid.
Investment

Price per private group, online live training, starting from 5200 € + VAT*

Contact us for an exact quote and to hear our latest promotions

Testimonials (1)

Provisional Upcoming Courses (Contact Us For More Information)

Related Categories