System and Network Security Introduction Training

Level: Foundation
Rating: 4.7/5 4.68/5 Based on 218 Reviews

In this Introduction to Network Security training course, you gain the knowledge and skills to analyze and assess network risks, then select and deploy appropriate countermeasures. Through multiple hands-on exercises you will learn to evaluate methods for strong authentication, search for possible vulnerabilities in operating systems, and reduce your organization’s exposure to dangers in enterprise-wide and virtual private networks.

Key Features of this Network Security Training

  • After-course instructor coaching benefit
  • Learning Tree end-of-course exam included
  • After-course computing sandbox included

You Will Learn How To:

  • Analyze your exposure to security threats
  • Protect your organization's systems and data
  • Deploy firewalls and data encryption to minimize threats
  • Assess alternative user and host authentication mechanisms
  • Manage risks originating from inside the organization and the internet



Choose the Training Solution That Best Fits Your Individual Needs or Organizational Goals


In Class & Live, Online Training

  • 4-day instructor-led training course
  • One-on-one after-course instructor coaching
  • After-course computing sandbox
  • Tuition can be paid later by invoice -OR- at the time of checkout by credit card
View Course Details & Schedule

Standard $3285 CAD

Government $2890 CAD




Team Training

  • Bring this or any training to your organization
  • Full - scale program development
  • Delivered when, where, and how you want it
  • Blended learning models
  • Tailored content
  • Expert team coaching

Customize Your Team Training Experience


Save More On Training with FlexVouchers – A Unique Training Savings Account

Our FlexVouchers help you lock in your training budgets without having to commit to a traditional 1 voucher = 1 course classroom-only attendance. FlexVouchers expand your purchasing power to modern blended solutions and services that are completely customizable. For details, please call 888-843-8733 or chat live.

In Class & Live, Online Training

Time Zone Legend:
Eastern Time Zone Central Time Zone
Mountain Time Zone Pacific Time Zone

Note: This course runs for 4 Days

  • Mar 15 - 18 9:00 AM - 4:30 PM PDT San Francisco / Online (AnyWare) San Francisco / Online (AnyWare) Reserve Your Seat

  • May 3 - 6 9:00 AM - 4:30 PM EDT Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare) Reserve Your Seat

  • Jul 19 - 22 9:00 AM - 4:30 PM EDT New York / Online (AnyWare) New York / Online (AnyWare) Reserve Your Seat

  • Sep 6 - 9 9:00 AM - 4:30 PM PDT San Francisco / Online (AnyWare) San Francisco / Online (AnyWare) Reserve Your Seat

Guaranteed to Run

When you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time — will run. Guaranteed.

Important Network Security Course Information

  • Recommended Experience

    • Familiarity using Microsoft Windows
  • Certification Preparation

    • This course covers multiple domains on the (ISC)2 CISSP certification exam
    • If you are interested in achieving the CISSP certification, see Course 2058, Certified Information Systems Security Professional (CISSP) Certification Exam Preparation
    • This course provides 23 'A-level' CPE credits toward maintaining your CISSP certification

Network Security Course Outline

  • Building a Secure Organization

    Real threats that impact cybersecurity

    • Hackers inside and out
    • Eavesdropping
    • Spoofing
    • Sniffing
    • Trojan horses
    • Viruses
    • Wiretaps

    A cyber security policy: the foundation of your protection

    • Defining your information assurance objectives
    • Assessing your exposure
  • A Cryptography Primer

    Securing data with symmetric encryption

    • Choosing your algorithm: DES, AES, Rc4 and others
    • Assessing key length and key distribution

    Solving key distribution issues with asymmetric encryption

    • Generating keys
    • Encrypting with RSA
    • PGP and GnuPG
    • Evaluating Web of Trust and PKI

    Ensuring integrity with hashes

    • Hashing with Md5 and SHA
    • Protecting data in transit
    • Building the digital signature
  • Verifying User and Host Identity

    Assessing traditional static password schemes

    • Creating a good quality password policy to prevent password guessing and cracking
    • Protecting against social engineering attacks
    • Encrypting passwords to mitigate the impact of password sniffing

    Evaluating strong authentication methods

    • Preventing password replay using one-time and tokenized passwords
    • Employing biometrics as part of multi-factor authentication

    Authenticating hosts

    • Distrusting IP addresses
    • Address-spoofing issues and countermeasures
    • Solutions for wireless networks
  • Preventing System Intrusions

    Discovering system vulnerabilities

    • Searching for operating system vulnerabilities
    • Discovering file permission issues
    • Limiting access via physical security

    Encrypting files for confidentiality

    • Encryption with application-specific tools
    • Recovering encrypted data

    Hardening the operating system

    • Locking down user accounts
    • Securing administrator's permissions
    • Protecting against viruses
  • Guarding Against Network Intrusions

    Scanning for vulnerabilities

    • Searching for rogue servers
    • Profiling systems and services

    Reducing Denial of Service (DoS) attacks

    • Securing DNS
    • Limiting the impact of common attacks

    Deploying firewalls to control network traffic

    • Preventing intrusions with filters
    • Implementing cyber security policy
    • Deploying personal firewalls

    Protecting web services and applications

    • Validating user input
    • Controlling information leakage
  • Ensuring Network Confidentiality

    Threats from the LAN

    • Sniffing the network
    • Mitigating threats from connected hosts
    • Partitioning the network to prevent data leakage
    • Identifying wireless LAN vulnerabilities

    Confidentiality on external connections

    • Ensuring confidentiality with encryption
    • Securing communication with IPSec

Team Training

Network Security Training FAQs

  • Can I take this Network Security course online?

    Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.

  • I am from a non-technical background. Will I benefit from this Network Security course?

    Yes, this is a foundation course, so you do not need to be an expert to gain great value from this course. You will gain knowledge and skills in network security that will help you protect your organization's systems and data.

Questions about which training is right for you?

call 888-843-8733
chat Live Chat

Why do we require your location?

It allows us to direct your request to the appropriate Customer Care team.

100% Satisfaction Guaranteed

Your Training Comes with a 100% Satisfaction Guarantee!*

*Partner-delivered courses may have different terms that apply. Ask for details.

San Francisco / Online (AnyWare)
Herndon, VA / Online (AnyWare)
New York / Online (AnyWare)
San Francisco / Online (AnyWare)
Why do we require your location?

It allows us to direct your request to the appropriate Customer Care team.

Preferred method of contact:
Chat Now

Please Choose a Language

Canada - English

Canada - Français