Cyber Security Advanced


Ensure the confidentiality, integrity, and availability of your organization’s information by protecting your communications and data. In this training course, you learn how to define and implement security principles, install and customize secure firewalls, build Virtual Private Network (VPN) tunnels, and safeguard your organization’s network perimeter against malicious attacks.

SKU: 9999999997
– Basic Security Knowledge : System and Network Security
– Working Knowledge of TCP/IP and Client Server ArchitectureThe Participants
This course is aimed to Middle to High levels of IT professionals, Practitioner Cyber SecurityCourses Objective
After completing this course, students will be able to:
• Fortify your network perimeter to provide an integrated defense
• Prevent or mitigate the effects of network attacks with a firewall
• Detect and respond to network attacks with Intrusion Detection and Prevention (IDP)
• Design, install, and configure secure Virtual Private Networks (VPNs)
• Mitigate the impact of Denial-of-Service (DoS) attacksCourse Outline1. Setting Your Security Objectives
Defining Security Principles
– Ensuring data Confidentialy, Integrity and Availability ( CIA )
– Assessing defensive techniques
– Setting a generic security stance
Developing a security policy
– Balancing risk with business requirements
– Identifying your information assurance objectives
– Choosing security technologies

2. Deploying a Secure Firewall
– Installing a firewall
– Configuring a firewall to support outgoing services
– Providing external services securely
– Allowing access to internal services

3. Detecting and Preventing Intrusion
– Deploying an IDS
– Detecting intrusions in the enterprise
– Interpreting alerts
– Stopping intruders

4. Configuring Remote User Virtual Private Networks (VPNs)
– Building VPN tunnels
– Deploying client software

5. Creating Site-to-Site VPNs
– Applying cryptographic protection
– Comparing tunneling and protection methods

6. Integrating Perimeter Defenses
– Reducing the impact of denial-of-service (DoS) attacks
– Perimeter architectures

Related products


[yikes-mailchimp form=”2″]


Powered by WhatsApp Chat

× Apa yang bisa kami bantu?