Skip Navigation Links
 
 
Security over any Networks
 
Roll over the picture, click to view some demo slides
Course Number1703
Price NIS before VAT800 (1270)
Duration (Days)1
LanguageEnglish/Hebrew
LevelIntermediate
JanFebMarAprMayJun
      
 
JulAugSepOctNovDec
      
+972 3 9247780 ext. 3
Tell about this course to a friend
   
 
Available training formats
 

This course provides a broad overview of the threats to the security of information systems, Countermeasures and tools for information security, System security principals and network security aspects.
 Topics include: Network risks, Information risks, Hacking and cracking challenges, Security vulnerabilities and exploits, Attack types, Firewall types, Access control, NAT, Intrusion detection , Content security, Remote Access, VPN , PPTP; L2TP, SSL, IPSec, Security policy, Architectural aspects, Monitoring and auditing and System security pitfalls.

 
 
  1. Security Threats
  • The Network playground
    • Environment explained
    • The players
    • A new way of thinking
  • Network risks
    • Real world risks
    • Networking vulnerability concepts
    • Networking defense concepts
  • Information risks
    • Real world risks
    • Information vulnerability concepts
    • Information defense concepts
  • Hacking and cracking challenges
    • nnovative attack nodules
    • Protect 80/20 – and get bitten
  • Security vulnerabilities and exploits
    • VDB
    • How can we use it to our own benefit
  • Attack types - review
  1. Security Countermeasures
  • Firewall types
    • ACL’s
    • Proxy’s
    • Statful and deep packet inspection
    • Application layer FW
  • Access control
    • What mechanisms are there besides FW
    • AC mechanisms
    • NAC/NAP
  • NAT
    • The security function of NAT
  • Defense In Depth
    • Methodologies
    • Best practices
  • Intrusion detection
    • What are the capabilities
    • How should we use it
  • How should we use it
    • Content security
    • Is this the next level of security?
    • How should RM integrate with leak prevention
 
  1. Virtual Private Networks
  • Remote Access
    • Why cant we do without it
    • What can we do to get the best out of it
  • VPN introduction
    • What is a VPN
    • What are the technologies we relay on
  • PPTP; L2TP
  • SSL
  • IPSec
  1. Network Systems and Security
  • Security requirements
    • Should we be intuitive or RTFM
    • Are there always best practices
    • The real and only requirement ($)
  • Security policy
    • How should a security policy be built
    • What should it contain
    • How should it be enforced
    • What is the value of the SP
  • Architectural aspects
    • Why we call it architecture
    • What points of view are possible
    • The basics of good design
  • Monitoring and auditing
    • The need behind M&A
    • Should we keep logs
    • What to do with all this information
  • System security pitfalls
    • Is best practice always a good thing
    • Standardization Vs. Innovation
    • Lack of understanding
    • The human factor
  1. Conclusion
  2. Glossary
 
  • Programmers, system administrators or IT staff wishing to become familiar with the various aspects of security in the World Wide Web.
  • TCP/IP knowledge
 
 
You consider we have missed something in the syllabus? Call us 972-3-9247780 ext. #3 or E-mail us    and we shall dispel your doubts.
Others who took this course also took the following course/courses:
 right now and we shall contact you immediately. 


 
Web hosting by Somee.com