Network Security

Network Security

Audience

This course is designed for IT professionals who need to understand how networks operate, what the sources of risk are and how to manage those risks. The course is particularly relevant to those who manage, or are responsible for large corporate networks.

Prerequisites

Delegates are expected to have a general familiarity with the use of ICT in businesses. You should feel comfortable loading, running and experimenting with software under guidance from the instructor. You should be able to take in your stride the command line and GUI utilities that are employed on the course.

Duration

3 days. Hands on.

This course is available on site only. Please call for details.

Course Objectives

This course covers network technology, the business objectives and, in particular, the risks inherent in corporate networks. In particular, it will help you to find out what is important in the world of networking and become familiar with networking terms so you will be able communicate with your network specialists.

Course Content

A review of Networking Technology
Network security concepts
Business issues
Network development lifecycle
Network hardware and software
Risks and objectives
Local area networks
TCP/IP
LAN devices
Directory services
Virtual private networks
Transmission system vulnerabilities
General network management
Ports and sockets
Routing
Various hacking and probing tools

WAN Technology
WAN technology
Frame relay
ATM
ISDN
ADSL
Satellite
General network management
Virtual private networks

Remote Access
Remote access topologies
Telephone lines
Authenticating remote users – the Shiva corporation
Defending the remote machine
Virtual private networking
Auditing equipment cross the internet
Wireless LANs (WLANs)
IP version 6 (IPV6)

Traffic Control
Candidate points of weakness
Standard firewall services
Firewall specimen specification
Firewall deployment
Risk assessment methods
Rule lists and logs

Building a Trust Infrastructure
Business objectives
Types of encryption
Symmetrical cryptography
PGP
Hash check-summing
SSL
Digital Certificates
VPNs

System Security Checks
Top 20 system risks in an e-commerce environment
Detection of vulnerabilities
What the hackers do
Best practice in resisting intrusions

On-Site Courses

Can't attend one of our public classes? Booking for multiple people?

All our courses are available on your site! Delivered for your staff, at your premises.

Contact us to find out more...