Byron Employment

Byron Employment. Over 154,200 Jobs Australia Wide.

Delivery Method

  • Classroom
  • Price: $2320.00

Course Outline: 2810 Fundamentals of Network Security

Duration: 4 Days

Overview:
This course provides students with the knowledge and skills to begin supporting network security within an organization. It will help identify security threats and vulnerabilities and assist with responding to and recovering from security incidents.

Outline:
Lesson 1: Preparing to Secure Information
- Explaining How Assets Are Attacked
- Explaining How Assets Are Secured

Lesson 2: Implementing Secure Computing Baselines
- Introduction to Trusted Computing Bases
- Establishing a Secure Baseline
- Monitoring a Secure Baseline
- Physically Securing Computers
- Maintaining a Secure Baseline

Lesson 3: Securing Information Using Authentication and Access Control
- Introduction to Access Control
- Implementing an Authentication Strategy
- Implementing an Access Control Strategy

Lesson 4: Using Cryptography to Secure Information
- Introduction to Cryptography
- Using Symmetric Encryption
- Using Hash Functions
- Using Public Key Encryption

Lesson 5: Using a PKI to Secure Information
- Introduction to Certificates
- Introduction to Public Key Infrastructure
- Deploying and Managing Certificates

Lesson 6: Securing Internet Applications and Components
- Securing Web Servers
- Configuring Security for Common Internet Protocols
- Configuring Security for Web Browsers
- Configuring Security for Databases

Lesson 7: Implementing Security for E-Mail and Instant Messaging
- Securing E-Mail Servers
- Securing E-Mail Clients
- Securing Instant Messaging

Lesson 8: Managing Security for Directory Services and DNS
- Securing Directory Services Against Common Threats
- Securing DNS Against Common Threats

Lesson 9: Securing Data Transmission
- Identifying Threats to Network Devices
- Implementing Security for Common Data Transmission
- Implementing Security for Remote Access
- Implementing Security for Wireless Network Traffic

Lesson 10: Implementing and Monitoring Security for Network Perimeters
- Introduction to Network Perimeters
- Implementing Security on Inbound and Outbound Network Traffic
- Monitoring Network Traffic

Lesson 11: Managing Operational Security
- Establishing Security Policies and Procedures
- Educating Users about Security Policies
- Applying Security Policies to Operational Management
- Resolving Ethical Dilemmas When Securing Assets

Lesson 12: Preserving Business Continuity
- Preparing to Recover from Disasters
- Communicating the Impact of Risks
- Performing a Secure Backup and Recovery

Lesson 13: Responding to Security Incidents
- Identifying Security Incidents
- Responding to Security Incidents
- Investigating Security Incidents


Lunch

Lunch is provided for students for the duration of the course

CLICK HERE TO BOOK THIS COURSE NOW!

WANT MORE INFORMATION?
CALL NOW ON (02) 8263 5906
CLICK ON THIS LINK TO ENQUIRE!

CLICK HERE TO
BOOK THIS COURSE NOW!
WANT MORE INFO?
CALL (02) 8263 5906 OR
CLICK HERE TO ENQUIRE

Search Courses

Quick Job Search