Make sure this course is right for you.
Get unbiased reviews and personalized recommendations.
Who should attend
Technical staff members who manage or support networked information systems and have
- two years of practical experience with networked systems or equivalent training/education
- some degree of specific familiarity with the ISO/OSI 7-layered reference model as well as TCP/IP, and major network operating systems such as Windows and Unix
About the course
This four-day course is designed to provide participants with practical techniques for protecting the security of an organization's information assets and resources, beginning with concepts and proceeding on to technical implementations.
The course provides a technical foundation for working with TCP/IP security and cryptography. The course focuses on concepts like host hardening, network hardening, network monitoring and helps participants learn to design a secure network architecture managing host systems, securing network services and infrastructure, working with firewalls, and understanding ways of monitoring and defending against cyber intrusions.
The principles, strategies, and practices covered are applicable to most system platforms and network environments. To illustrate important concepts and security technologies, demonstrations and exercises will include implementations applicable to Linux and Windows systems as well as Cisco Internetworking equipment.
The course involves extensive hands-on laboratories utilizing heterogeneous network environment, scenario-based exercises, lecture/briefings, and open discussion to help participants develop their understanding of the problems and strategies for securing information systems and networks.
Hands-on labs include subjects such as: securing website with digital certificate, implementing Arpwatch, and DNSSEC, configuring network segmentation using firewalls and routers, implementing intrusion detection and logging, analyzing log events and alerts, hardening of Linux, Windows, and Cisco platforms. By completing all the labs, each student will end up creating their own instance of a full-fledged secured network environment. Thereafter, students will work in a team-based exercise to monitor and defend the newly created secured network against cyber intrusions. Each student will have the use of a laptop for the duration of the course to work on labs and exercises.
This course will help participants to
- describe the components of survivability
- summarize key security concerns of the TCP/IP protocol suite
- discuss the benefits of cryptography when applied to IS properties of confidentiality, integrity, and availability
- list common methods of gathering information on networked systems
- support best practices for hardening and actively defending host and networked systems from intrusions
- use tools to actively monitor network for any signs of intrusions
- develop an approach for staying current with trends and requisite skills in information security
- describe types of current vulnerabilities and threats to which an organization's information assets may be exposed
- protect against common attack methods perpetrated against network systems
- The Challenge of Survivability
- Cryptography and its application
- TCP/IP Security
- Secure Network Design
- Intrusion Detection, Prevention, and Access Controls
- Network Monitoring
- Logging principles and best practices
- Securing Host Systems
- Host and Application Security
- Common Cyber Attacks and Preventive Measures
Participants will receive course books with lectures and lab manuals and a downloadable copy of course materials.
Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.
We are happy to help you find a suitable online alternative.