Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Network Security
- TCP/IP protocol vulnerabilities: TCP, UDP, HTTP, ARP, ICMP, DHCP, DNS
- Impact of network addresses for network security: IPv4 and IPv6 addresses, MAC addresses, network segmentation, CIDR notation, NAT, public vs. private networks
- Network infrastructure and technologies: Network security architecture, DMZ, virtualization, cloud, honeypot, proxy server, IDS, IPS
- Secure wireless SoHo network: MAC address filtering, encryption standards and protocols, SSID
- Cryptography: CIA, Hashes, PKI
- Secure access technologies: tunneling, VPN, NAC, load balancing
- Types of security data: alert, session and transaction data, full packet capture, statistical data
- Logs: Syslog, SIEM and log collection
- Evaluating alerts: rules and alerts, analysis tools, Security Onion
Endpoint security Concepts
- Operating system security concepts: Windows update management, local security policy, Windows Defender Firewall
- Linux server administration, filtering rules, service configuration file, hardening device, service logs
- System logs: Event Viewer, audit logs, system and application logs, syslog, identification of anomalies
- Malware removal: Scanning systems, reviewing scan logs, malware remediation, host-based Intrusion Prevention
- Application security: block list, allow list, sandboxing
Cyber Threat Management
- Network Security Testing: vulnerability scanner, security automation, technique, tools
- Threat Intelligence: standards, CVE database, Intelligence platforms
- Vulnerability assesment: network and server profiling, CVSS
- Risk Management, Assesment and Security controls
- Digital Forensic and Incident Analysys and Response
- Disaster Recovery
Requirements
- Experience in Cybersecurity
21 Hours
Testimonials (5)
Accessing tools and being able to ask questions to someone friendly who I felt wouldn't judge me
Kiara
Course - Open Source Cyber Intelligence - Introduction
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
The simple explanation of the trainer
Mohammed salem - Palestinian Police
Course - Open Source Intelligence (OSINT) Advanced
A wide range of knowledge of the lecturer.
Marcin Szklarski - Santander Consumer Bank
Course - CCSK Plus (Certificate of Cloud Security Knowledge - Plus)
Lot's of information explained very well. Good examples, interesting exercises. Trainer showed us his real world experience.