Security for IT Practitioners

5 Day Course
Hands On
Code SFITP

Book Now - 1 Delivery Method Available:

Scheduled Online Onsite

Overview

A 5-day course that covers Security broadly within the world of Information Security. Many practical labs are used throughout the course to improve student understanding of theoretical concepts and give them experience of real-world products.

This course is aimed at individuals who want to move into the Internet Security arena or simply want to gain a broader working knowledge of the topic.

Training Partners

We work with the following best of breed training partners using our bulk buying power to bring you a wider range of dates, locations and prices.

Modules

Hide all

Introduction to security (10 topics)

  • What is security
  • White hats v black hats
  • Threats to resources
  • A simple security model
  • Industry security standards
  • Security policies
  • Authentication
  • Encryption
  • Access control
  • Audit and administer

TCP/IP for Security (5 topics)

  • TCP/IP Architecture
  • LANs and WANs
  • IP and ICMP services
  • ARP and routing
  • Transport services

Applied Cryptography (7 topics)

  • Encryption and trust relationships
  • Symmetric encryption
  • Asymmetric encryption
  • Message digests
  • Digital certificates
  • Certificate authorities
  • IPSec and VPNs

Virtual Private Networks (6 topics)

  • VPN Benefits
  • PPP with PAP and CHAP
  • Tunnelling Protocols
  • Virtual Private Dial-up Networks
  • IPSec
  • Internet Key Exchange (IKE)

Types of Attack (9 topics)

  • Spoofing
  • Man-in-the-middle
  • Denial of service
  • Insider attacks
  • Bug-based attacks
  • Key logging
  • Brute force attacks
  • Trojans, viruses and worms
  • Root kits

Firewall Roles and Types (6 topics)

  • Packet filters
  • Stateful inspection
  • Circuit level gateways
  • Application proxies
  • Demilitarised zones
  • Network address translation

Firewall Design Topology and Management (4 topics)

  • Design principles
  • Common topologies
  • ICMP and firewalls
  • Firewall management

World Wide Web Security (6 topics)

  • Web technologies
  • Browser privacy
  • Cookies
  • Mobile code threats
  • Web server security
  • Web traffic security

Intrusion Detection Systems (2 topics)

  • IDS methodologies
  • IDS concerns

Operating System Security (3 topics)

  • Key OS vulnerabilities
  • Windows security components
  • Linux security components

The Auditing Process (6 topics)

  • Introduction
  • Risk analysis
  • Ethical hacking
  • Auditing and log analysis
  • Windows & Linux logging
  • Making recommendations and producing reports

Prerequisites

Delegates should have an awareness of the concepts of Internet security and some hands-on experience with computers and networks.

or call:408-759-5074

Course PDF

Print

Share this Course

+1
Share

Recommend this Course

Sections