In today”s Internet-dependent business environment, organizations must link their systems across enterprise-wide and virtual private networks as well as connect mobile users. In this course, you learn how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to network threats.
Objectives:
Over two intensive days you will learn:
- Analyze your exposure to security threats and protect your organization”s systems and data
- Deploy firewalls and data encryption to minimize threats
- Assess alternative user and host authentication mechanisms
- Manage risks emanating from inside the organization and from the Internet
WHO SHOULD ATTEND?
Those who require the fundamental skills to develop and implement security schemes designed to protect their organization”s information from threats.
Course Outline:
Security Threats:
- The Internet playground
- Business risks
- Hacking and cracking challenges
- Security vulnerabilities and exploits
- Attack types – review
Security Countermeasures:
- Firewall types and access control
- Multiple level securities
- Intrusion detection
- Content security
- NAT
- Authentication
Virtual Private Networks – an overview:
- IPSec and Tunneling
- Remote Access
- SSL
- E-commerce
- Remote access
Network Systems and Security:
- Security requirements
- Security policy
- Architectural aspects
- Monitoring and auditing
- System security pitfalls
WORKSHOP STYLE:
A mixture of short presentations, interactive discussion, individual exercises and group work. The emphasis throughout is on a practical approach using case material and examples.