* All fees are exclusive of vat
** PREMIUM - Customize your learning experience
A key way that attackers gain access to a company's resources is through a network connected to the Internet. A company wants to try to prevent as many attacks as possible, but in cases where it cannot prevent an attack, it must detect it in a timely manner. Therefore, an understanding and ability to create and identify the goals of building a defensible network architecture are critical. It is just as important to know and understand the architecture of the system, types of designs, communication flow and how to protect against attacks using devices such as routers and firewalls. These essentials, and more, will be covered during 401.1, in order to provide a firm foundation for the consecutive days of training.
Understanding attacks, the vulnerability behind those attacks and how to prioritize the information and steps to secure the systems will be essential. Common attacks occur with web applications, authentication and other forms of communication. It is imperative to gain familiarity with protocols and techniques used to monitor, stop and even perform attacks against systems.
Anyone who works in security, is interested in security, or has to understand security should take this course, including:
Defensible Network Architecture
Virtualization and Cloud Security
Lab Virtual Machine Setup
Network Device Security
Networking and Protocols
Lab - tcpdump
Securing Wireless Networks
Lab - Aircrack-ng
Securing Web Communications
Lab -Wireshark
Defense-in-Depth
Access Control & Password Management
Lab - John the Ripper
Security Policies
Lab - Cain & Abel
Critical Controls
Malicious Code and Exploit Mitigations
Lab - Malicious Software
Advanced Persistent Threat (APT)
Vulnerability Scanning and Penetration Testing
Lab - nmap
Network Security Devices
Lab - Snort
Endpoint Security
Lab -hping
SIEM/log management
Active Defense
Lab - Command Injection
Cryptography
Lab - Stego
Cryptography Algorithms and Deployment
Applying Cryptography
Lab - GPG
Incident Handling and Response
Lab - Hashing
Contingency Planning - BCP/DRP
IT Risk Management
Windows Security Infrastructure
Lab - Process Hacker
Service packs, hot fixes, and backups
Windows access controls
Lab - Microsoft Baseline Security Analyzer
Enforcing security policy
Lab - Secedit
Securing Windows Network Services
Automation, auditing, and forensics
Lab - PowerShell Scripting
Linux Security: Structure, Permissions and Access
Hardening and Securing Linux Services
Monitoring and Attack Detection
Security Utilities
Averest Training Certificate of Completion or delegates who attend and complete the training course
This course is certified by:
This Course can be customized delivered to a group at your facility saving time and money.