Course Description
An organizational focus on cyber defense is now more important than ever, as cyber breaches have become more commonplace. These breaches can have a severe financial impact and can cause broad reputational damage.
Despite their best efforts to prevent breaches, many organizations defenses are still being compromised as a result of a lack of knowledge. Therefore, organizations must be well equipped with trained network engineers who are focused on protecting, detecting, and responding to the threats on their networks, as part of their defense mechanisms.
What Do Participants Learn?
- Understand computer network and defense fundamentals
- Know the network security threats, attacks, controls, protocols, and devices
- Design and implement a network security policy
- Grasp a firm grip on physical and host securities
- Learn about secure firewall, VPN, and IDS configuration and management
- Monitor and analyze network traffic
- Comprehend wireless network defense
- Backup and recover data
- Speculate and manage network risks and vulnerabilities
Who Should Attend?
- Understand computer network and defense fundamentals
- Know the network security threats, attacks, controls, protocols, and devices
- Design and implement a network security policy
- Grasp a firm grip on physical and host securities
- Learn about secure firewall, VPN, and IDS configuration and management
- Monitor and analyze network traffic
- Comprehend wireless network defense
- Backup and recover data
- Speculate and manage network risks and vulnerabilities
What Will the Learning Experience Include?
Phase: 1
Introduce
- Comprehensive pre-program activities include:
- Web-based information forms & surveys completed by attendee.
- Direct consultation with the attendee about the expectations.
- During the training, participants engage in data, activities, and conversations that lead to insight and knowledge.
- Participants learn from expert trainers who have both academic and business experiences.
- Highly applicable training content & instructive activities for adding depth to training topics.
- **A half-day site visit for integrating the experience & plan next steps. Opportunities to provide connections, ideas & support.
Phase: 2
Explore & Practice
Phase: 3
Apply
- Apply & sustain the learning experience by using this ongoing support:
- To ensure participant has new skills or behavior progress.
- Optional, fee-based mentoring & coaching with the trainer.
- Training materials & additional documents (e-books, pdf files, presentations and articles)
- Evaluate your training experience by giving us feedbacks and help us to reach our organizational goals.
- Participant's Evaluation
- Trainer's Evaluation
Phase: 4
EVALUATE
Module 01: Computer Network and Defence Fundamentals.
Module 02: Network Security Threats, Vulnerabilities, and Attacks.
Module 03: Network Security Controls, Protocols, and Devices.
Module 04: Network Security Policy Design and Implementation.
Module 05: Physical Security.
Module 06: Host Security.
Module 07: Secure Firewall Configuration and Management.
Module 08: Secure IDS Configuration and Management.
Module 09: Secure VPN Configuration and Management.
Module 10: Wireless Network Defence.
Module 11: Network Traffic Monitoring and Analysis.
Module 12: Network Risk and Vulnerability Management.
Module 13: Data Backup and Recovery.
Module 14: Network Incident Response and Management.