- Experience in Cybersecurity
This instructor-led, live training (online or onsite) is aimed at advanced users who wish to use improve their knowledge.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Network Security
- TCP/IP protocol vulnerabilities: TCP, UDP, HTTP, ARP, ICMP, DHCP, DNS
- Impact of network addresses for network security: IPv4 and IPv6 addresses, MAC addresses, network segmentation, CIDR notation, NAT, public vs. private networks
- Network infrastructure and technologies: Network security architecture, DMZ, virtualization, cloud, honeypot, proxy server, IDS, IPS
- Secure wireless SoHo network: MAC address filtering, encryption standards and protocols, SSID
- Cryptography: CIA, Hashes, PKI
- Secure access technologies: tunneling, VPN, NAC, load balancing
- Types of security data: alert, session and transaction data, full packet capture, statistical data
- Logs: Syslog, SIEM and log collection
- Evaluating alerts: rules and alerts, analysis tools, Security Onion
Endpoint security Concepts
- Operating system security concepts: Windows update management, local security policy, Windows Defender Firewall
- Linux server administration, filtering rules, service configuration file, hardening device, service logs
- System logs: Event Viewer, audit logs, system and application logs, syslog, identification of anomalies
- Malware removal: Scanning systems, reviewing scan logs, malware remediation, host-based Intrusion Prevention
- Application security: block list, allow list, sandboxing
Cyber Threat Management
- Network Security Testing: vulnerability scanner, security automation, technique, tools
- Threat Intelligence: standards, CVE database, Intelligence platforms
- Vulnerability assesment: network and server profiling, CVSS
- Risk Management, Assesment and Security controls
- Digital Forensic and Incident Analysys and Response
- Disaster Recovery
Österreich - Cybersecurity Advanced
Schweiz - Cybersecurity Advanced
Deutschland - Cybersecurity Advanced
Denmark - Cybersecurity Advanced
Finland - Cybersecurity Advanced
Greece - Cybersecurity Advanced
Magyarország - Cybersecurity Advanced
Luxembourg - Cybersecurity Advanced
España - Cybersecurity Advanced
Italia - Cybersecurity Advanced
România - Cybersecurity Advanced
Türkiye - Cybersecurity Advanced
Bulgaria - Cybersecurity Advanced
Kazakhstan - Cybersecurity Advanced
Moldova - Cybersecurity Advanced
Slovenia - Cybersecurity Advanced
Croatia - Cybersecurity Advanced
Serbia - Cybersecurity Advanced
Bhutan - Cybersecurity Advanced