Course Outline
- Module 01: Network Attacks and Defense Strategies
- Module 02: Administrative Network Security
- Module 03: Technical Network Security
- Module 04: Network Perimeter Security
- Module 05: Endpoint Security-Windows Systems
- Module 06: Endpoint Security-Linux Systems
- Module 07: Endpoint Security- Mobile Devices
- Module 08: Endpoint Security-IoT Devices
- Module 09: Administrative Application Security
- Module 10: Data Security
- Module 11: Enterprise Virtual Network Security
- Module 12: Enterprise Cloud Network Security
- Module 13: Enterprise Wireless Network Security
- Module 14: Network Traffic Monitoring and Analysis
- Module 15: Network Logs Monitoring and Analysis
- Module 16: Incident Response and Forensic Investigation
- Module 17: Business Continuity and Disaster Recovery
- Module 18: Risk Anticipation with Risk Management
- Module 19: Threat Assessment with Attack Surface Analysis
- Module 20: Threat Prediction with Cyber Threat Intelligence
Requirements
- An understanding of ___
- Experience with ___
- ___ programming experience
Audience
- ___
- ___
- ___
Testimonials
Related Courses
Cisco CCNA Syllabus in 5 Days
35 hoursA 5 day practical networking course designed to familiarise students with Cisco IOS (version 12). The course details the key commands used to configure and secure Cisco routers and switches, and covers the CCNA syllabus - including wired and
Understanding IPSec VPNs
14 hoursThis 2 day course investigates the theory and technology associated with IPSec VPN’s.VPN’s are setup using Cisco IOS Routers and ASA Firewalls using the web interface. The workings of the protocols are examined using debug commands and
Understanding IPv6
14 hoursA 2 day theoretical course (with some practical demonstrations) covering the fundamentals of Internet Protocol v6 – including addressing, protocol formats, ICMP v6, discovery processes and IP v6 routing. Audience: Network Planners,
Practical TCP/IP
28 hoursThis 4 day course involves a mixture of expository based (utilising protocol analyser traces where appropriate) and practical experiments to test and verify the operation of TCP/IP networks. The major aspects of the TCP/IP protocol stack are
BeyondCorp: Implementing Zero Trust Security
14 hoursBeyondCorp is an open source Zero Trust security framework that allows employees to work securely from any location without the need for a traditional VPN. In this instructor-led, live training, participants will learn hands-on how to set up a
Certified Lead Ethical Hacker
35 hoursWhy should you attend? The Certified Lead Ethical Hacker training course enables you to develop the necessary expertise to perform information system penetration tests by applying recognized principles, procedures and penetration testing
Network Security
14 hoursSince all applications today heavily rely on communication and networks, there is no application security without network security. This course focuses on network security with a software security viewpoint, and discusses common network attacks
Zscaler
14 hoursZscaler is a SaaS security platform that provides a fast and secure connection between a user and any application. This instructor-led, live training (online or onsite) is aimed at systems administrators who wish to learn how to use Zscaler to
System and Network Security with FortiGate
21 hoursFortiGuard Labs is a security and threat intelligence research company by Fortinet, one of the leading cybersecurity service providers today. Among its most notable products are FortiGate next-generation firewalls (NGFWs) that are more efficient
Network Security in Linux
14 hoursDuring the course, participants will learn: What is denial of service attacks, Flooding, Sniffing, MIM? How to break from the network to the server? How to watch packets on the network (also running on switches)? Do you watch any
Network Security Administrator
35 hoursAudience: System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.
Penetration Testing with Nmap
14 hoursNmap is a port scanner used for penetration and network testing. Port scanners such as Nmap, discover vulnerable communications on computer network systems. This instructor-led, live training (online or onsite) is aimed at software testers who
OpenVAS
14 hoursOpenVAS is an advanced open source framework which consists of several services and tools for network vulnerability scanning and management. In this instructor-led, live training, participants will learn how to use OpenVAS for network
Palo Alto Firewalls
21 hoursPalo Alto Networks offers a platform that includes advanced firewalls and cloud extension. Palo Alto firewalls prevents malware intrusion with an automated approach that delivers consistent security. This instructor-led, live training (online or
Wireless Network and Telecom Network Security
35 hoursWireless and telecom network security refers the practices carried out to safeguard communication devices, terminal equipment, routing equipment, servers and Wireless devices and networks against malicious attacks. This instructor-led, live