Security for IT Practitioners
Starting dates and places
Description
Prerequisites:
Delegates should have an awareness of the concepts of Internet security and some hands-on experience with computers and networks.Course Description:
A 5-day course that covers Security broadly withinthe world of Information Security. Many practical labs are used throughout the course to improve student understanding of theoretical concepts and give them experience of real-world products.
This course is aimed at individuals who want to move into the Internet Security arena or simply want to gain a broader working knowledge of the topic.
This course includes the following modules:
Introduction to security
- What is security
- White hats v black hats
- Threats to resources
- A simple security…
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Prerequisites:
Delegates should have an awareness of the concepts of Internet security and some hands-on experience with computers and networks.Course Description:
A 5-day course that covers Security broadly withinthe world of Information Security. Many practical labs are used throughout the course to improve student understanding of theoretical concepts and give them experience of real-world products.
This course is aimed at individuals who want to move into the Internet Security arena or simply want to gain a broader working knowledge of the topic.
This course includes the following modules:
Introduction to security
- What is security
- White hats v black hats
- Threats to resources
- A simple security model
- Industry security standards
- Security policies
- Authentication
- Encryption
- Access control
- Audit and administer
TCP/IP for Security
- TCP/IP Architecture
- LANs and WANs
- IP and ICMP services
- ARP and routing
- Transport services
Applied Cryptography
- Encryption and trust relationships
- Symmetric encryption
- Asymmetric encryption
- Message digests
- Digital certificates
- Certificate authorities
- IPSec and VPNs
Virtual Private Networks
- VPN Benefits
- PPP with PAP and CHAP
- Tunnelling Protocols
- Virtual Private Dial-up Networks
- IPSec
- Internet Key Exchange (IKE)
Types of Attack
- Spoofing
- Man-in-the-middle
- Denial of service
- Insider attacks
- Bug-based attacks
- Key logging
- Brute force attacks
- Trojans, viruses and worms
- Root kits
Firewall Roles and Types
- Packet filters
- Stateful inspection
- Circuit level gateways
- Application proxies
- Demilitarised zones
- Network address translation
Firewall Design Topology and Management
- Design principles
- Common topologies
- ICMP and firewalls
- Firewall management
World Wide Web Security
- Web technologies
- Browser privacy
- Cookies
- Mobile code threats
- Web server security
- Web traffic security
Intrusion Detection Systems
- IDS methodologies
- IDS concerns
Operating System Security
- Key OS vulnerabilities
- Windows security components
- Linux security components
The Auditing Process
- Introduction
- Risk analysis
- Ethical hacking
- Auditing and log analysis
- Windows & Linux logging
- Making recommendations and producing reports
For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.