Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Network Security
- TCP/IP protocol vulnerabilities: TCP, UDP, HTTP, ARP, ICMP, DHCP, DNS
- Impact of network addresses for network security: IPv4 and IPv6 addresses, MAC addresses, network segmentation, CIDR notation, NAT, public vs. private networks
- Network infrastructure and technologies: Network security architecture, DMZ, virtualization, cloud, honeypot, proxy server, IDS, IPS
- Secure wireless SoHo network: MAC address filtering, encryption standards and protocols, SSID
- Cryptography: CIA, Hashes, PKI
- Secure access technologies: tunneling, VPN, NAC, load balancing
- Types of security data: alert, session and transaction data, full packet capture, statistical data
- Logs: Syslog, SIEM and log collection
- Evaluating alerts: rules and alerts, analysis tools, Security Onion
Endpoint security Concepts
- Operating system security concepts: Windows update management, local security policy, Windows Defender Firewall
- Linux server administration, filtering rules, service configuration file, hardening device, service logs
- System logs: Event Viewer, audit logs, system and application logs, syslog, identification of anomalies
- Malware removal: Scanning systems, reviewing scan logs, malware remediation, host-based Intrusion Prevention
- Application security: block list, allow list, sandboxing
Cyber Threat Management
- Network Security Testing: vulnerability scanner, security automation, technique, tools
- Threat Intelligence: standards, CVE database, Intelligence platforms
- Vulnerability assesment: network and server profiling, CVSS
- Risk Management, Assesment and Security controls
- Digital Forensic and Incident Analysys and Response
- Disaster Recovery
Requirements
- Experience in Cybersecurity
21 Hours
Testimonials (5)
I learned a lot and gained knowledge can use at my work!
Artur - Akademia Lomzynska
Course - Active Directory for Admins
General course information
Paulo Gouveia - EID
Course - C/C++ Secure Coding
Nothing it was perfect.
Zola Madolo - Vodacom
Course - Android Security
It opens up a lot and gives lots of insight what security
Nolbabalo Tshotsho - Vodacom SA
Course - Advanced Java Security
I genuinely enjoyed the great information and content.