888Poker ! Let's us help you to became best player

Review and Tips: Poker Casino Sport .

You are not logged in.

#1 2020-09-13 08:51:33

JakeA8504
Member
From: France, Aix-En-Provence
Registered: 2020-09-13
Posts: 1

Training Course: Fundamentals of IT Security

Training Course: Fundamentals of  IT Security .

A primer in IT Security that addresses foundational topics including: IT Risk Analysis

Network and Platform security, wireless technology, cryptography, VPNs, and Firewalls.
Emphasis is consistently placed on understanding and mitigating risk, defense-in-depth, vulnerability patterns,  Best Practices , and effective countermeasures.  The class can be enhanced with hands-on labs with your choice of Firewall and VPN technology.
Individuals seeking a solid grounding in IT Security; particularly those  interested in  subsequently learning more about any of the following: Network security, Platform security, Industrial Control System (ICS) security, and how to design and implement secure software.
3 Days.

Be familiar with basic IT Security concepts and terms

Understand  the importance  of “Defense-in-Depth”.
Be familiar with a Security Domains framework that facilitates IT Risk  recognition  and reduction.

Be prepared to recognize and analyze IT Security Risk

Be prepared to identify IT Security  vulnerabilities  and implement effective Countermeasures.
Be familar with important internetworking concepts and terms.
Understand the purpose and effective deployment of Firewall and VPN  technology .
Internet access.
Cryptography Tools ( recommended ).
OpenSSL ( recommended ).
Lab Router(s), WAP(s), Firewalls (optional).
Lab IDPS(s) (optional).
Prerequisites & Setup.
Topic 3:     Malware.
Viruses, Worms, and Trojans… Oh My !.
Malware  Characteristic s.
Malware Detection and Removal.
Additional Resources.

Lab Exercise: Don’t Catch Anything !
Topic 4:     Understanding IT Security Risk

Risk and Risk Management.
Threats and Attacker Motivation.
Internal Threats.
Examples of IT Security Risk.
Risk Valuation.
Lab Exercise: Closer to Home.
Topic 5:     Internetworking Primer.

IT Security and Internetworking

Networking Concepts and Terms.
The OSI Reference Model.
TCP/IP.
IP Addresses.
Ethernet.
Internetwork Communications.
Routers.
Dynamic Host Control Protocol (DHCP).
Domain Name Service (DNS).
Address Resolution Protocol (ARP).
Transport Layer.
User Datagram Protocol (UDP).
Transport Control Protocol (TCP).
What is a Virtual Private Network (VPN) ?.
Simple Network Management Protocol (SNMP).
Lab Exercise: Vulnerabilities.

Topic 6:     Introduction to Firewalls

What is a Firewall ?.
Network Address Translation (NAT).
Stateless Packet Filtering.
Stateful Inspection.
Firewall Policy.
Firewalls and Network Architecture.
Unified Policy Approach.
Lab Exercise: Fire Prevention.

Topic 7:     IT Security Macro Patterns

Security Domains Revisited.

What are IT Security Macro Patterns ?

Security Domains and Change.
General Security.
Access Control.
Platform Security.
Network Security.
Application Security.
Lab Exercise: Close to Home.
Topic 8:     Introduction to Cryptography.
Message Integrity.
Message Integrity: SHA.
Steganography.
Encryption Methods.
Symmetric Encryption.
Stream Ciphers.
Encryption Methods: Block Cipher Modes.
Data Encryption Standard (AES).
Advanced Encryption Standard (AES).
Secure Key Exchange.
Asymmetric Encryption (Public Key Cryptography).
Overview of Cryptanalysis.
Lab Exercise: I Said What ?.
Topic 9:     Public Key Infrastructure.
Digital Signatures.
Digital Certificates.
Public Key Cryptography.
Public Key Infrastructure.
How HTTPS Works.
X.509 Digital Certificates.
Example: Digital Certificates.
Certificate Authorities.
Trust Models.
Certificate Validation.
Certificate Revocation.
Key Management.

Lab Exercise: Are You Certifiable ?

Topic 10:     Understanding Virtual Private Networks (VPNs).
VPN Technologies Overview.
Deployment Architectures.
IPsec Overview.
Authentication Header (AH).

Encapsulated Security Payload (ESP)

Internet Key Exchange (IKE).
IPComp.
VPN Operational Overview.
VPN Implementation.

Topic 11:     Wireless Network Security

Overview.
WLAN Technologies and Standards.
WLAN Vulnerabilities.
WAP Countermeasures.
802.11.
802.11i.
Lab Exercise: On the Air !.
Topic 12:     Intrusion Detection and Prevention Systems.
Functions.
Network Based Solutions.
Detection Technologies.
Prevention Features.
IDS/IPS Deployment.
IDPS Limitations.
Host Based Solutions.
Protecting Wireless Networks.
IDPS Challenges.
Sample Products.
Lab Exercise: Product Research.
Appendix     Acronyms.
For more information or to register for this training course, call 1-800-840-2335 or  on our website.
[email protected]
Training Course: Fundamentals of IT Security.
Theme:  by aThemes.

Offline

Kèo nhà cái

Board footer

Powered by FluxBB