Course Outline

Introduction – what is security?

  • Some basic definitions and how to think about security
  • Profiles of attackers, i.e. who might want to attack us and why
  • Simple risk management, or what to protect first
  • Threat and vulnerability assessment
  • Sources of good practices and recommendations

Basic confidentiality and integrity mechanisms

  • Encryption – basic algorithms, where they are used and what they give us
  • Cryptographic attacks – what algorithms to avoid and why
  • Integrity – how to protect data against modification
  • Certificates and public key infrastructure (PKI)
  • Man-in-the-middle attacks
  • Secure password storage
  • Password cracking and user database leaks – what is it all about?

Network security services

  • AAA model
  • Authentication and authorization protocols (RADIUS, TACACS, Kerberos)
  • IEEE 802.1x – user and device authentication
  • Protection of services in local networks (DHCP Snooping, Dynamic ARP Inspection)

Security systems

  • Firewalls – types, operating methods, configuration
  • Intrusion prevention systems (IPS/IDS)
  • Data Leak Protection (DLP)
  • Event logging systems

Wireless networks

  • WEP, WPA, WPS – what is it about?
  • Hacking attempt, or what can be obtained from intercepted traffic

Building a wide area network - connecting branches

  • Traffic tunneling protocols – basics
  • VPN tunnels – types (site-to-site and remote access)
  • Corporate vs. public VPNs – what's the point?
  • Security problems – what solutions should not be used

Security testing

  • Penetration testing – what is it about?
  • Network scanning and vulnerability detection
  • Attempted network attack

Requirements

    knowledge of basic issues concerning computer networks (IP addressing, Ethernet, basic services - DNS, DHCP) knowledge of Windows and Linux operating systems (basic administration, system terminal)

Audience

    people responsible for the security of networks and services, network and system administrators who want to learn about security systems, everyone interested in the subject.
 28 Hours

Number of participants



Price per participant

Testimonials (7)

Related Courses

CRISC - Certified in Risk and Information Systems Control

21 Hours

Standard Java Security

14 Hours

Java and Web Application Security

21 Hours

Related Categories