Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Network Security
- Vulnerabilities in TCP/IP protocols: TCP, UDP, HTTP, ARP, ICMP, DHCP, DNS
- Impact of network addresses on network security: IPv4 and IPv6 addresses, MAC addresses, network segmentation, CIDR notation, NAT, public versus private networks
- Network infrastructure and technologies: Network security architecture, DMZ, virtualization, cloud computing, honeypots, proxy servers, intrusion detection systems (IDS), intrusion prevention systems (IPS)
- Secure wireless SoHo network: MAC address filtering, encryption standards and protocols, SSID management
- Cryptography principles: Confidentiality, Integrity, Availability (CIA), Hash functions, Public Key Infrastructure (PKI)
- Secure access technologies: Tunneling, Virtual Private Networks (VPNs), Network Access Control (NAC), load balancing
- Types of security data: Alerts, session and transaction data, full packet capture, statistical data
- Logs and logging systems: Syslog, Security Information and Event Management (SIEM) systems, log collection practices
- Evaluating security alerts: Rules and alert configurations, analysis tools, Security Onion platform
Endpoint Security Concepts
- Operating system security: Windows update management, local security policies, Windows Defender Firewall configurations
- Linux server administration: Filtering rules, service configuration files, device hardening, log management for services
- System logs and monitoring: Event Viewer, audit logs, system and application logs, syslog, anomaly detection
- Malware removal procedures: System scanning, log review, malware remediation, host-based intrusion prevention systems (HIPS)
- Application security measures: Block lists, allow lists, sandboxing techniques
Cyber Threat Management
- Network security testing: Vulnerability scanners, security automation techniques and tools
- Threat intelligence: Standards, Common Vulnerabilities and Exposures (CVE) database, intelligence platforms
- Vulnerability assessment: Network and server profiling, Common Vulnerability Scoring System (CVSS)
- Risk management, assessment, and security controls for government
- Digital forensics and incident analysis and response for government
- Disaster recovery planning and implementation for government
Requirements
- Experience in cybersecurity for government
21 Hours
Testimonials (3)
Experience sharing, it's teacher's know-how and valuable.
Carey Fan - Logitech
Course - C/C++ Secure Coding
get to understand more about the product and some key differences between RHDS and open source OpenLDAP.
Jackie Xie - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
the knowledge of the trainer was very high - he knew what he was talking about, and knew the answers to our questions