Network Security Expert

Network Security Expert is a comprehensive course which covers the nitty gritty of network security. It is a vendor independent course, designed to make the security engineer aware of how exactly security can be built into an organization's network. It gives an in depth understanding of the underlying protocols and mechanisms of network security. The Network Security Engineer would be able to configure firewalls, security policies, NAT, VPNs, IPS/IDS, content security, etc. at the end of this course, irrespective of the vendor, with very little additional platform specific training.

The course will cover:
Introduction To Networking
  • OSI Model
  • IP addressing
  • Subnetting
Networking Devices
  • Switches
  • Routers
  • Access points
Networking Protocols
  • HTTP
  • HTTPS
  • FTP
  • DHCP
  • Domain Naming System
  • Telnet
  • SSH
  • NTP
  • Syslog
Routing And Routing Protocols
  • Static Routing
  • Default Routing
  • Dynamic Routing Protocols
Troubleshooting Networks
  • ICMP
  • SNMP
  • Ping
  • Trace route
  • Sniffers
  • Protocol Analysis
  • Wireshark
  • Syslog analysis
Network Security
  • Layer 1 Security
  • Layer 2 Security
  • Vlans
  • Port security
  • Wireless Security
  • Layer 3 security
  • Routers with Access lists
  • Securing Routers
  • Device - Role based access
  • NTP
  • Log management and log analyses
Firewall
  • Types of firewalls
  • Packet filtering
  • Proxy server
  • Stateful inspection
  • Designing Security with Firewalls
  • Routed mode
  • Transparent / Bridge mode
  • NAT
  • Static NAT
  • Dynamic NAT
  • PAT
Security Policy
Security Policy
Application Security
Application Security
Content / Web Security
  • URL filtering
  • Blacklists and whitelists
  • Keyword filtering
  • Category based filtering
Authentication
  • RADIUS
  • Kerberos
  • LDAP
Virtual Private Networks
  • Encryption Algorithms
  • Symmetric and Asymmetric cryptography
  • Public / Private key Infrastructure (PKI)
  • Hash Algorithms
  • GRE
  • IPSEC
  • ISAKMP/IKE
  • Phase 1 Negotiations
  • Phase 2 Negotiations
  • Main mode and aggressive mode
  • Diffie Hellman Algorithm
  • IPSec SAs and IKE SAs
  • Site to site VPNs
  • Remote access VPNs
  • Troubleshooting VPNs
  • SSL
Intrusion Detection / Intrusion Prevention Systems
  • IPS/IDS Signatures
  • Custom Signatures
  • Fine tuning of Signatures
  • Snort
Host Security
  • OS hardening
  • Patch management
Live Virtual Classroom

We have scheduled our Live Virtual Classroom sessions across several time zones to provide you with choice and convenience.

Course Outline
PDF
For Certification: Click Here
Get this course from our authorized training partner. Click Here