Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction – What is Security?
- Basic definitions and how to think about security
- Attacker profiles – who might want to attack us and why
- Simple risk management – what to secure first
- Threat and vulnerability assessment
- Sources of best practices and recommendations
Basic Confidentiality and Integrity Mechanisms
- Encryption – basic algorithms, where they are used and what they offer
- Cryptographic attacks – which algorithms to avoid and why
- Integrity – how to protect data against modification
- Certificates and Public Key Infrastructure (PKI)
- Man-in-the-middle attacks
- Secure password storage
- Password cracking and user database leaks – what is involved?
Network Security Services
- AAA Model
- Authentication and authorization protocols (RADIUS, TACACS, Kerberos)
- IEEE 802.1x – user and device authentication
- Protection of services in local networks (DHCP Snooping, Dynamic ARP Inspection)
Security Systems
- Firewalls – types, operating methods, configuration
- Intrusion Prevention Systems (IPS/IDS)
- Data Leakage Prevention (DLP)
- Event logging systems
Wireless Networks
- WEP, WPA, WPS – what is involved?
- Hacking attempts – what can be achieved from captured traffic
Building Wide Area Networks – Connecting Branch Offices
- Tunneling protocols for traffic – basics
- VPN tunnels – types (site-to-site and remote access)
- Corporate vs. public VPNs – what is involved?
- Security issues – which solutions to avoid
Security Testing
- Penetration testing – what is involved?
- Network scanning and vulnerability detection
- Simulated network attack
Requirements
- Knowledge of basic computer network concepts
(IP addressing, Ethernet, core services – DNS, DHCP) - Familiarity with Windows and Linux operating systems (basic administration, system terminal)
Audience
- Persons responsible for network and service security,
- Network and system administrators wishing to learn about security systems,
- Anyone interested in the topic.
28 Hours
Testimonials (1)
The trainer had an excellent knowledge of fortigate and delivered the content very well. Thanks a lot to Soroush.