Course Outline

Introduction – what is security?

  • Some basic definitions and how to think about security
  • Attacker profiles, or who might want to attack us and why
  • Simple risk management, or what to protect first
  • Threat and vulnerability assessment
  • Sources of good practices and recommendations

Basic confidentiality and integrity mechanisms

  • Encryption – Basic Algorithms, Where They Are Used and What They Give Us
  • Cryptographic attacks – which algorithms to avoid and why
  • Integrity – How to protect data from modification
  • Certificates and public key infrastructure (PKI)
  • Man-in-the-middle attacks
  • Secure password storage
  • Password Cracking and User Database Leaks – What’s It All About?

Network security services

  • AAA model
  • Authentication and authorization protocols (RADIUS, TACACS, Kerberos)
  • IEEE 802.1x – User and Device Authentication
  • Protection of services in local networks (DHCP Snooping, Dynamic ARP Inspection)

Security systems

  • Firewalls – types, methods of operation, configuration
  • Intrusion prevention systems (IPS/IDS)
  • Data Leak Protection (DLP)
  • Event logging systems

Wireless networks

  • WEP, WPA, WPS – what is it all about?
  • Attempted hacking, or what can be obtained from intercepted traffic

Building a wide area network – connecting branches

  • Traffic Tunneling Protocols – The Basics
  • VPN Tunnels – Types (Site-to-Site and Remote Access)
  • Corporate vs. Public VPNs – What’s the Deal?
  • Security Problems – or What Solutions Not to Use

Security testing

  • Penetration Testing – What Is It All About?
  • Network scanning and vulnerability detection
  • Network attack attempt

Requirements

  • knowledge of basic network issues
    computer (IP addressing, Ethernet, basic services – DNS, DHCP)
  • knowledge of Windows and Linux operating systems (basics of administration, system terminal)

Audience

  • people responsible for network and service security,
  • network and system administrators who want to learn about security systems,
  • everyone interested in the topic.
 28 Hours

Testimonials (1)

Related Categories