Fundamentals of Network Security
Course
In Bath and London
Description
-
Type
Course
-
Location
-
Duration
4 Days
At the end of the course, students will be able to explain common attacks against network assets; explain how to use cryptography choose an appropriate encryption method; implement security-enhanced computing baselines; help protect information by using authentication and access control; deploy and manage certificates; help protect transmission of data by identifying threats to. Suitable for: This course provides students with the knowledge and skills to begin supporting network security within an organization. It has been approved as CompTIA Authorized Quality Curriculum (CAQC) for the CompTIA Security+ certification.
Facilities
Location
Start date
Start date
Start date
About this course
Before attending this course, students must have the following pre-requisites:A minimum of 1 year of experience managing Windows 2000 Server or have equivalent knowledge and skills.
Reviews
Course programme
This course provides students with the knowledge and skills to begin supporting network security within an organization. It has been approved as CompTIA Authorized Quality Curriculum (CAQC) for the CompTIA Security+ certification.
Pre-Requisites
Before attending this course, students must have the following pre-requisites:A minimum of 1 year of experience managing Windows 2000 Server or have equivalent knowledge and skills.
Purpose
At the end of the course, students will be able to explain common attacks against network assets; explain how to use cryptography choose an appropriate encryption method; implement security-enhanced computing baselines; help protect information by using authentication and access control; deploy and manage certificates; help protect transmission of data by identifying threats to network devices and implementing security for common data transmission, remote access, and wireless network traffic; help protect Web servers against common attacks and configure security for Web browsers; help protect e-mail messages and instant messaging from common security threats; identify common security threats and vulnerabilities to directory services and DNS, and then protect them; identify network perimeter threats; identify types of security policies and ensure compliance by users; preserve business continuity by implementing a security-enhanced disaster recovery strategy and performing secure backup and recovery; identify, respond to, and assist in the formal investigation of security incidents.
Course outline
- Preparing to Secure Information
- Implementing Security-Enhanced Computing Baselines
- Helping to Protect Information Using Authentication and Access Control
- Using Cryptography to Help Protect Information
- Using a PKI to Help Protect Information
- Securing Internet Applications and Components
- Implementing Security for E-Mail and Instant Messaging
- Managing Security for Directory Services and DNS
- Securing Data Transmission
- Implementing and Monitoring Security for Network Perimeters
- Managing Operational Security
- Preserving Business Continuity
- Responding to Security Incidents
- Explaining How Assets Are Attacked
- Explaining How Assets Are Secured
- Lab: Preparing to Secure Information
- Introduction to Trusted Computing Bases
- Establishing a Security Baseline
- Monitoring a Security Baseline
- Helping to Secure Computers Physically
- Maintaining a Security Baseline
- Lab: Maintaining Baseline Security
- Introduction to Access Control
- Implementing an Authentication Strategy
- Implementing an Access Control Strategy
- Lab: Securing Accounts (MBSA)
- Introduction to Cryptography
- Using Symmetric Encryption
- sing Hash Functions
- Using Public Key Encryption
- Lab: Using Cryptography to Help Protect Information
- Introduction to Certificates
- Introduction to Public Key Infrastructure
- Deploying and Managing Certificates
- Lab: Using Certificates
- Helping to Protect Web Servers
- Configuring Security for Common Internet Protocols
- Configuring Security for Web Browsers
- Configuring Security for Databases
- Lab: Securing Web Servers
- Lab: Protecting Clients from Active Content
- Securing E-Mail Servers
- Securing E-Mail Clients
- Securing Instant Messaging
- Lab: Securing Mail Servers
- Helping protect Directory Services Against Common Threats
- Helping Protect DNS Against Common Threats
- Lab: Managing Security for Directory Services and DNS
- Identifying Threats to Network Devices
- Implementing Security for Common Data Transmission
- Implementing Security for Remote Access
- Implementing Security for Wireless Network Traffic
- Lab: Securing Data Transmission
- Lab: Using IPSec to Secure Data Transmission
- Introduction to Network Perimeters
- Implementing Security on Inbound and Outbound Network Traffic
- Monitoring Network Traffic
- Introduction to Network Perimeters
- Implementing Security on Inbound and Outbound Network Traffic
- Monitoring Network Traffic
- Lab: Implementing and Monitoring Security for Network Perimeters
- Establishing Security Policies and Procedures
- Educating Users about Security Policies
- Applying Security Policies to Operational Management
- Resolving Ethical Dilemmas When Helping to Protect Assets
- Lab: Managing Operational Security
- Preparing to Recover from Disasters
- Communicating the Impact of Risks
- Performing a Security-Enhanced Backup and Recovery
- Lab: Preserving Business Continuity
- Identifying Security Incidents
- Responding to Security Incidents
- Investigating Security Incidents
- Lab: Responding to Security Incidents
Fundamentals of Network Security