Course Outline

Network Security

  • Vulnerabilities in TCP/IP protocols: TCP, UDP, HTTP, ARP, ICMP, DHCP, DNS
  • Impact of network addresses on security: IPv4 and IPv6 addresses, MAC addresses, network segmentation, CIDR notation, Network Address Translation (NAT), public versus private networks
  • Network infrastructure and technologies: Security architecture for government, Demilitarized Zones (DMZs), virtualization, cloud computing, honeypots, proxy servers, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS)
  • Secure wireless Small Office/Home Office (SoHo) networks: MAC address filtering, encryption standards and protocols, Service Set Identifier (SSID)
  • Cryptography principles: Confidentiality, Integrity, Availability (CIA), hash functions, Public Key Infrastructure (PKI)
  • Secure access technologies: Tunneling, Virtual Private Networks (VPNs), Network Access Control (NAC), load balancing
  • Types of security data: Alerts, session and transaction data, full packet capture, statistical data
  • Log management: Syslog, Security Information and Event Management (SIEM) systems, log collection
  • Evaluating alerts: Rules and alert configurations, analysis tools, Security Onion

Endpoint Security Concepts

  • Operating system security concepts: Windows update management, local security policies, Windows Defender Firewall
  • Linux server administration: Filtering rules, service configuration files, hardening devices, service logs
  • System log analysis: Event Viewer, audit logs, system and application logs, syslog, identification of anomalies
  • Malware removal: Scanning systems, reviewing scan logs, malware remediation, host-based Intrusion Prevention Systems (IPS)
  • Application security: Block lists, allow lists, sandboxing

Cyber Threat Management

  • Network security testing: Vulnerability scanners, security automation techniques and tools
  • Threat intelligence: Standards, Common Vulnerabilities and Exposures (CVE) database, intelligence platforms
  • Vulnerability assessment: Network and server profiling, Common Vulnerability Scoring System (CVSS)
  • Risk management, assessment, and security controls for government
  • Digital forensics and incident analysis and response
  • Disaster recovery strategies

Requirements

  • Experience in cybersecurity for government
 21 Hours

Number of participants


Price per participant

Testimonials (5)

Upcoming Courses

Related Categories