Preferred method of contact:

System and Network Security Introduction

COURSE TYPE

Foundation

Course Number

468

Duration

4 Days

PDF Add to WishList

In this cyber security training course, you gain the knowledge and skills to analyze and assess network risks, select and deploy appropriate countermeasures, evaluate methods for strong authentication, search for possible vulnerabilities in operating systems, and reduce your organization’s exposure to dangers in enterprise-wide and virtual private networks.

You Will Learn How To

  • Analyze your exposure to security threats
  • Protect your organization's systems and data
  • Deploy firewalls and data encryption to minimize threats
  • Assess alternative user and host authentication mechanisms
  • Manage risks originating from inside the organization and the internet

Important Course Information

Recommended Experience:

  • Familiarity using Microsoft Windows

Certification Preparation:

  • This course covers multiple domains on the (ISC)2 CISSP certification exam
  • If you are interested in achieving the CISSP certification, see Course 2058, Certified Information Systems Security Professional (CISSP) Certification Exam Preparation
  • This course provides 23 'A-level' CPE credits toward maintaining your CISSP certification

Course Outline

  • Building a Secure Organization

Real threats that impact cybersecurity

  • Hackers inside and out
  • Eavesdropping
  • Spoofing
  • Sniffing
  • Trojan horses
  • Viruses
  • Wiretaps

A cyber security policy: the foundation of your protection

  • Defining your information assurance objectives
  • Assessing your exposure
  • A Cryptography Primer

Securing data with symmetric encryption

  • Choosing your algorithm: DES, AES, Rc4 and others
  • Assessing key length and key distribution

Solving key distribution issues with asymmetric encryption

  • Generating keys
  • Encrypting with RSA
  • PGP and GnuPG
  • Evaluating Web of Trust and PKI

Ensuring integrity with hashes

  • Hashing with Md5 and SHA
  • Protecting data in transit
  • Building the digital signature
  • Verifying User and Host Identity

Assessing traditional static password schemes

  • Creating a good quality password policy to prevent password guessing and cracking
  • Protecting against social engineering attacks
  • Encrypting passwords to mitigate the impact of password sniffing

Evaluating strong authentication methods

  • Preventing password replay using one-time and tokenized passwords
  • Employing biometrics as part of multi-factor authentication

Authenticating hosts

  • Distrusting IP addresses
  • Address-spoofing issues and countermeasures
  • Solutions for wireless networks
  • Preventing System Intrusions

Discovering system vulnerabilities

  • Searching for operating system vulnerabilities
  • Discovering file permission issues
  • Limiting access via physical security

Encrypting files for confidentiality

  • Encryption with application-specific tools
  • Recovering encrypted data

Hardening the operating system

  • Locking down user accounts
  • Securing administrator's permissions
  • Protecting against viruses
  • Guarding Against Network Intrusions

Scanning for vulnerabilities

  • Searching for rogue servers
  • Profiling systems and services

Reducing Denial of Service (DoS) attacks

  • Securing DNS
  • Limiting the impact of common attacks

Deploying firewalls to control network traffic

  • Preventing intrusions with filters
  • Implementing cyber security policy
  • Deploying personal firewalls

Protecting web services and applications

  • Validating user input
  • Controlling information leakage
  • Ensuring Network Confidentiality

Threats from the LAN

  • Sniffing the network
  • Mitigating threats from connected hosts
  • Partitioning the network to prevent data leakage
  • Identifying wireless LAN vulnerabilities

Confidentiality on external connections

  • Ensuring confidentiality with encryption
  • Securing communication with IPSec
Show complete outline
Show Less

Convenient Ways to Attend This Instructor-Led Course

Hassle-Free Enrolment: No advance payment required to reserve your seat.
Tuition due 30 days after you attend your course.

In the Classroom

Live, Online

Private Team Training

In the Classroom — OR — Live, Online

Tuition — Standard: $3285   Government: $2890

Nov 14 - 17 (4 Days)
9:00 AM - 4:30 PM EST
Toronto / Online (AnyWare) Toronto / Online (AnyWare) Reserve Your Seat

How would you like to attend?

Live, Online
In-Class

Dec 12 - 15 (4 Days)
9:00 AM - 4:30 PM EST
Rockville, MD / Online (AnyWare) Rockville, MD / Online (AnyWare) Reserve Your Seat

How would you like to attend?

Live, Online
In-Class

Jan 2 - 5 (4 Days)
9:00 AM - 4:30 PM EST
Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare) Reserve Your Seat

How would you like to attend?

Live, Online
In-Class

Feb 20 - 23 (4 Days)
9:00 AM - 4:30 PM EST
New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

How would you like to attend?

Live, Online
In-Class

Mar 13 - 16 (4 Days)
9:00 AM - 4:30 PM EDT
Online (AnyWare) Online (AnyWare) Reserve Your Seat

How would you like to attend?

Live, Online

Apr 17 - 20 (4 Days)
9:00 AM - 4:30 PM EDT
Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Reserve Your Seat

How would you like to attend?

Live, Online
In-Class

May 29 - Jun 1 (4 Days)
9:00 AM - 4:30 PM EDT
Rockville, MD / Online (AnyWare) Rockville, MD / Online (AnyWare) Reserve Your Seat

How would you like to attend?

Live, Online
In-Class

Jun 26 - 29 (4 Days)
9:00 AM - 4:30 PM EDT
Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare) Reserve Your Seat

How would you like to attend?

Live, Online
In-Class

Jul 17 - 20 (4 Days)
9:00 AM - 4:30 PM EDT
Online (AnyWare) Online (AnyWare) Reserve Your Seat

How would you like to attend?

Live, Online

Aug 21 - 24 (4 Days)
9:00 AM - 4:30 PM EDT
New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

How would you like to attend?

Live, Online
In-Class

Guaranteed to Run

Show all dates
Show fewer dates

Private Team Training

Enroling at least 3 people in this course? Consider bringing this (or any course that can be custom designed) to your preferred location as a private team training.

For details, call 1-888-843-8733 or Click here »

Tuition

Standard

Government

In Classroom or
Online

Standard

$3285

Government

$2890

Private Team Training

Contact Us »

Course Tuition Includes:

After-Course Instructor Coaching
When you return to work, you are entitled to schedule a free coaching session with your instructor for help and guidance as you apply your new skills.

After-Course Computing Sandbox
You'll be given remote access to a preconfigured virtual machine for you to redo your hands-on exercises, develop/test new code, and experiment with the same software used in your course.

Free Course Exam
You can take your Learning Tree course exam on the last day of your course or online at any time after class and receive a Certificate of Achievement with the designation "Awarded with Distinction."

Prev
Next

Training Hours

Standard Course Hours: 9:00 am – 4:30 pm
*Informal discussion with instructor about your projects or areas of special interest: 4:30 pm – 5:30 pm

FREE Online Course Exam (if applicable) – Last Day: 3:30 pm – 4:30 pm
By successfully completing your FREE online course exam, you will:

  • Have a record of your growth and learning results
  • Bring proof of your progress back to your organization
  • Earn credits toward industry certifications (if applicable)

Enhance Your Credentials with Professional Certification

Learning Tree's comprehensive training and exam preparation guarantees that you will gain the knowledge and confidence to achieve professional certification and advance your career.

This course is approved by CompTIA for continuing education units (CEUs). For additional information and to confirm which courses are eligible towards your CompTIA certification, click here.

“The System and Network Security course has proven really useful, especially the part about how hackers gain information, (e.g. initial handshake between client and server) and what to do to minimize their ability to infiltrate”.

- G Charlton, Solution Engineer
AstraZeneca

Prev
Next
Chat Now

Please Choose a Language

Canada - English

Canada - Français