Get in Touch

Course Outline

Network Security

  • Vulnerabilities in TCP/IP protocols: TCP, UDP, HTTP, ARP, ICMP, DHCP, DNS
  • Impact of network addresses on network security: IPv4 and IPv6 addresses, MAC addresses, network segmentation, CIDR notation, NAT, public versus private networks
  • Network infrastructure and technologies: Network security architecture, DMZ, virtualization, cloud computing, honeypots, proxy servers, intrusion detection systems (IDS), intrusion prevention systems (IPS)
  • Secure wireless SoHo network: MAC address filtering, encryption standards and protocols, SSID management
  • Cryptography principles: Confidentiality, Integrity, Availability (CIA), Hash functions, Public Key Infrastructure (PKI)
  • Secure access technologies: Tunneling, Virtual Private Networks (VPNs), Network Access Control (NAC), load balancing
  • Types of security data: Alerts, session and transaction data, full packet capture, statistical data
  • Logs and logging systems: Syslog, Security Information and Event Management (SIEM) systems, log collection practices
  • Evaluating security alerts: Rules and alert configurations, analysis tools, Security Onion platform

Endpoint Security Concepts

  • Operating system security: Windows update management, local security policies, Windows Defender Firewall configurations
  • Linux server administration: Filtering rules, service configuration files, device hardening, log management for services
  • System logs and monitoring: Event Viewer, audit logs, system and application logs, syslog, anomaly detection
  • Malware removal procedures: System scanning, log review, malware remediation, host-based intrusion prevention systems (HIPS)
  • Application security measures: Block lists, allow lists, sandboxing techniques

Cyber Threat Management

  • Network security testing: Vulnerability scanners, security automation techniques and tools
  • Threat intelligence: Standards, Common Vulnerabilities and Exposures (CVE) database, intelligence platforms
  • Vulnerability assessment: Network and server profiling, Common Vulnerability Scoring System (CVSS)
  • Risk management, assessment, and security controls for government
  • Digital forensics and incident analysis and response for government
  • Disaster recovery planning and implementation for government

Requirements

  • Experience in cybersecurity for government
 21 Hours

Number of participants


Price per participant

Testimonials (3)

Upcoming Courses

Related Categories