NETWORK SECURITY POLICY CONFIGURATION AND ADMINISTRATION

Content

Security Fundamentals

  • Information Security Cycle
  • Information Security Control
  • Authentication Methods
  • Cryptography Fundamentals
  • Security Policy Fundamentals

Security Threats and Vulnerabilities

  • Social Engineering
  • Physical Threats and Vulnerabilities
  • Network-Based Threats
  • Wireless Threats and Vulnerabilities
  • Software Based Threats

Network Security

  • Network Devices and Technologies
  • Network Design Elements and Components
  • Implement Networking Protocols
  • Apply Network Security Administration Principles
  • Secure Wireless Traffic

Access Control, Authentication and Account Management

  • Access Control and Authentication Services
  • Implement Account Management Security Controls

Managing Certificates

  • Install a Certificate Authority (CA) Hierarchy
  • Enroll Certificates
  • Secure Network Traffic by Using Certificates
  • Renew and Revoke Certificates
  • Backup and Restore Certificates and Private keys

Risk Management

  • Risk Analysis
  • Implement Vulnerability Assessment Tools and Techniques
  • Scan for Vulnerabilities
  • Mitigation and Deterrent Techniques

Compliance and Operational Security

  • Physical Security
  • Legal Compliance
  • Security Awareness and Training

FOR WHOM: CIOs, Heads of Departments, IT Professionals, System Analysts, Network Administrators, Servers Managers, Network Engineers, Systems/Security Administrators, IT Development Managers and others who perform related functions.

 

DATE:                10th – 12th July, 2024

                             16th – 18th December, 2024

 

Category:

Objective

Today’s professionals must possess a solid foundation in networking concepts and practices to streamline enterprise operations and maintain a competitive edge. This workshop provides participants with a working knowledge of IP addressing, TCP/IP Operation, LAN solutions, Quality of Service (QoS) requirements, wireless network options, security elements and enterprise internetworking.

Reviews

There are no reviews yet.

Be the first to review “NETWORK SECURITY POLICY CONFIGURATION AND ADMINISTRATION”

Your email address will not be published. Required fields are marked *

Shopping Cart