Course Outline
This course equips professionals with the fundamental skills needed to effectively secure, manage, and operate network communication equipment and systems across diverse organizational settings. Each module is strategically crafted to position learners for success, paving the way for them to secure prominent roles in both technological and business-oriented sectors.
Upcoming Meetings
There are no upcoming meetings for this course. Contact us to schedule this course, which will be customized specifically for your organization.
info@hackerupro.comModules
Network Security Systems & Architecture
- Cisco Certified CyberOps Associate
- Networking Recap
- Redundancy Methods
- Network Security Design
- Network Security Systems
Secure Management & Access
- Authentication, Authorization, and Accounting
- RADIUS vs. TACACS +
- 802.1X Authentication
Network Security Models & Cryptography
- Network Security Models
- Cryptography Overview
- Hash Algorithms
- Encryption
- Digital Signatures and Certificates
Firewalls
- Introduction to Firewalls
- Structure and Configuration of Firewall Rules
- Firewall Services & Features
- NGFW & DPI
Virtual Private Networks (VPN)
- Basic VPN Concepts
- VPN Protocols
- VPN Deployment Options
- VPN Security Considerations
- Remote Access Service
Network Monitoring
- Introduction to Network Monitoring
- Simple Network Management Protocol
- NetFlow
- Key Network Monitoring Tools
- Modern Network Monitoring Tools and Techniques
Network Traffic Analysis
- Introduction to Network Packet Analysis
- Wireshark and Network Packet Analysis
- NetworkMiner
- tcpdump and Zeek
Network Attacks & Mitigations
- Understanding Network Attacks
- Active Network Attacks
- Data Link / OSI Layer 2 Attacks
- Network / OSI Layer 3 Attacks
- Transport / OSI Layer 4 Attacks
- Transport to Application / OSI Layers 5-7 Attacks
Threat Detection, Prevention, and Response
- Introduction to IDS/IPS
- IDS/IPS Considerations
- IDS/IPS Detection Methods
- Introduction to NDR and MDR
Final Project
Prerequisites
- Familiarity with client-server communication models, networking concepts, and basic computer operations.
- A basic understanding of potential cyber threats and security awareness.