Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction – what is security?
- Some basic definitions and how to think about security
- Profiles of attackers, i.e. who might want to attack us and why
- Simple risk management, or what to protect first
- Threat and vulnerability assessment
- Sources of good practices and recommendations
Basic confidentiality and integrity mechanisms
- Encryption – basic algorithms, where they are used and what they give us
- Cryptographic attacks – what algorithms to avoid and why
- Integrity – how to protect data against modification
- Certificates and public key infrastructure (PKI)
- Man-in-the-middle attacks
- Secure password storage
- Password cracking and user database leaks – what is it all about?
Network security services
- AAA model
- Authentication and authorization protocols (RADIUS, TACACS, Kerberos)
- IEEE 802.1x – user and device authentication
- Protection of services in local networks (DHCP Snooping, Dynamic ARP Inspection)
Security systems
- Firewalls – types, operating methods, configuration
- Intrusion prevention systems (IPS/IDS)
- Data Leak Protection (DLP)
- Event logging systems
Wireless networks
- WEP, WPA, WPS – what is it about?
- Hacking attempt, or what can be obtained from intercepted traffic
Building a wide area network - connecting branches
- Traffic tunneling protocols – basics
- VPN tunnels – types (site-to-site and remote access)
- Corporate vs. public VPNs – what's the point?
- Security problems – what solutions should not be used
Security testing
- Penetration testing – what is it about?
- Network scanning and vulnerability detection
- Attempted network attack
Requirements
- knowledge of basic issues concerning computer networks (IP addressing, Ethernet, basic services - DNS, DHCP) knowledge of Windows and Linux operating systems (basic administration, system terminal)
Audience
- people responsible for the security of networks and services, network and system administrators who want to learn about security systems, everyone interested in the subject.
28 Hours
Testimonials (7)
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
A wide range of knowledge of the lecturer.
Marcin Szklarski - Santander Consumer Bank
Course - CCSK Plus (Certificate of Cloud Security Knowledge - Plus)
Lap Qradar
Sutthikan Noisombat - NTT
Course - IBM Qradar SIEM: Beginner to Advanced
Accessing tools and being able to ask questions to someone friendly who I felt wouldn't judge me
Kiara
Course - Open Source Cyber Intelligence - Introduction
The simple explanation of the trainer
Mohammed salem - Palestinian Police
Course - Open Source Intelligence (OSINT) Advanced
the balance between lectures and practice, the rhythm, the trainer knowledge and pedagogic skill
Armando Pinto - EID
Course - C/C++ Secure Coding
Very good knowledge and character.