System and Network Security Introduction Training

Level: Intermediate
Course #:468

Course info - Prices, Enrollment

You Will Learn How To:

Analyze your exposure to security threats

Protect your organization’s systems and data

Deploy firewalls and data encryption to minimize threats

Assess alternative user and host authentication mechanisms

Manage risks originating from inside the organization and the internet


Important Network Security Course Information

Recommended Experience

Familiarity using Microsoft Windows Certification Preparation

This course covers multiple domains on the (ISC)2 CISSP certification exam

Professional (CISSP) Certification Exam Preparation

This course provides 23 ‘A-level’ CPE credits toward maintaining your CISSP certification


Network Security Course Outline

Building a Secure Organization

Real threats that impact cybersecurity

Hackers inside and out




Trojan horses



A cyber security policy: the foundation of your protection

Defining your information assurance objectives Assessing your exposure

A Cryptography Primer

Securing data with symmetric encryption

Choosing your algorithm: DES, AES, Rc4 and others

Assessing key length and key distribution

Solving key distribution issues with asymmetric encryption

Generating keys

Encrypting with RSA

PGP and GnuPG

Evaluating Web of Trust and PKI

Ensuring integrity with hashes

Hashing with Md5 and SHA

Protecting data in transit Building the digital signature

Verifying User and Host Identity

Assessing traditional static password schemes

Creating a good quality password policy to prevent password guessing and cracking

Protecting against social engineering attacks

Encrypting passwords to mitigate the impact of password sniffing

Evaluating strong authentication methods

Preventing password replay using one-time and tokenized passwords

Employing biometrics as part of multi-factor authentication

Authenticating hosts

Distrusting IP addresses

Address-spoofing issues and countermeasures

Solutions for wireless networks

Preventing System Intrusions

Discovering system vulnerabilities

Searching for operating system vulnerabilities

Discovering file permission issues

Limiting access via physical security

Encrypting files for confidentiality

Encryption with application-specific tools

Recovering encrypted data

Hardening the operating system

Locking down user accounts

Securing administrator’s permissions

Protecting against viruses

Guarding Against Network Intrusions

Scanning for vulnerabilities

Searching for rogue servers

Profiling systems and services

Reducing Denial of Service (DoS) attacks

Securing DNS

Limiting the impact of common attacks

Deploying firewalls to control network traffic

Preventing intrusions with filters

Implementing cyber security policy

Deploying personal firewalls

Protecting web services and applications

Validating user input

Controlling information leakage

Ensuring Network Confidentiality

Threats from the LAN

Sniffing the network

Mitigating threats from connected hosts

Partitioning the network to prevent data leakage

Identifying wireless LAN vulnerabilities

Confidentiality on external connections

Ensuring confidentiality with encryption

Securing communication with IPSec

Course info - Prices, Enrollment