Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Network Security
- Vulnerabilities in TCP/IP protocols: TCP, UDP, HTTP, ARP, ICMP, DHCP, DNS
- Impact of network addresses on security: IPv4 and IPv6 addresses, MAC addresses, network segmentation, CIDR notation, Network Address Translation (NAT), public versus private networks
- Network infrastructure and technologies: Security architecture for government, Demilitarized Zones (DMZs), virtualization, cloud computing, honeypots, proxy servers, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS)
- Secure wireless Small Office/Home Office (SoHo) networks: MAC address filtering, encryption standards and protocols, Service Set Identifier (SSID)
- Cryptography principles: Confidentiality, Integrity, Availability (CIA), hash functions, Public Key Infrastructure (PKI)
- Secure access technologies: Tunneling, Virtual Private Networks (VPNs), Network Access Control (NAC), load balancing
- Types of security data: Alerts, session and transaction data, full packet capture, statistical data
- Log management: Syslog, Security Information and Event Management (SIEM) systems, log collection
- Evaluating alerts: Rules and alert configurations, analysis tools, Security Onion
Endpoint Security Concepts
- Operating system security concepts: Windows update management, local security policies, Windows Defender Firewall
- Linux server administration: Filtering rules, service configuration files, hardening devices, service logs
- System log analysis: Event Viewer, audit logs, system and application logs, syslog, identification of anomalies
- Malware removal: Scanning systems, reviewing scan logs, malware remediation, host-based Intrusion Prevention Systems (IPS)
- Application security: Block lists, allow lists, sandboxing
Cyber Threat Management
- Network security testing: Vulnerability scanners, security automation techniques and tools
- Threat intelligence: Standards, Common Vulnerabilities and Exposures (CVE) database, intelligence platforms
- Vulnerability assessment: Network and server profiling, Common Vulnerability Scoring System (CVSS)
- Risk management, assessment, and security controls for government
- Digital forensics and incident analysis and response
- Disaster recovery strategies
Requirements
- Experience in cybersecurity for government
21 Hours
Testimonials (5)
Explaining in detail regarding RHDS.
Murat Kumburlu - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
I learned a lot and gained knowledge can use at my work!
Artur - Akademia Lomzynska
Course - Active Directory for Admins
General course information
Paulo Gouveia - EID
Course - C/C++ Secure Coding
Trainer willing to answer questions and give bunch of examples for us to learn.
Eldrick Ricamara - Human Edge Software Philippines, Inc. (part of Tribal Group)
Course - Security Testing
It opens up a lot and gives lots of insight what security