NETWORK SECURITY POLICY CONFIGURATION AND ADMINISTRATION
Content
Security Fundamentals
Information Security Cycle
Information Security Control
Authentication Methods
Cryptography Fundamentals
Security Policy Fundamentals
Security Threats and Vulnerabilities
Social Engineering
Physical Threats and Vulnerabilities
Network-Based Threats
Wireless Threats and Vulnerabilities
Software Based Threats
Network Security
Network Devices and Technologies
Network Design Elements and Components
Implement Networking Protocols
Apply Network Security Administration Principles
Secure Wireless Traffic
Access Control, Authentication and Account Management
Access Control and Authentication Services
Implement Account Management Security Controls
Managing Certificates
Install a Certificate Authority (CA) Hierarchy
Enroll Certificates
Secure Network Traffic by Using Certificates
Renew and Revoke Certificates
Backup and Restore Certificates and Private keys
Risk Management
Risk Analysis
Implement Vulnerability Assessment Tools and Techniques
Scan for Vulnerabilities
Mitigation and Deterrent Techniques
Compliance and Operational Security
Physical Security
Legal Compliance
Security Awareness and Training
FOR WHOM: CIOs, Heads of Departments, IT Professionals, System Analysts, Network Administrators, Servers Managers, Network Engineers, Systems/Security Administrators, IT Development Managers and others who perform related functions.
Today’s professionals must possess a solid foundation in networking concepts and practices to streamline enterprise operations and maintain a competitive edge. This workshop provides participants with a working knowledge of IP addressing, TCP/IP Operation, LAN solutions, Quality of Service (QoS) requirements, wireless network options, security elements and enterprise internetworking.
Reviews
There are no reviews yet.
Be the first to review “NETWORK SECURITY POLICY CONFIGURATION AND ADMINISTRATION” Cancel reply
Reviews
There are no reviews yet.