Skip to main content

Defending the Perimeter from Cyber Attacks Training

Code: 2010 Category: Tag:

This Defending the Perimeter from Cyber Attacks course will teach you to ensure the confidentiality, integrity, and availability of your organization’s information by protecting your communications and data. You will learn how to define and implement security principles, install and customize secure firewalls, build Virtual Private Network (VPN) tunnels, and safeguard your organization’s network perimeter against malicious attacks.

Basic security knowledge at the level of:
Course 468, System and Network Security Introduction
Working knowledge of TCP/IP and client server architecture

Defending the Perimeter from Cyber Attacks Training Delivery Methods
After-course instructor coaching benefit
4thdacad end-of-course exam included
Defending the Perimeter from Cyber Attacks Training Course Benefits
Fortify your network perimeter to provide an integrated defensePrevent or mitigate the effects of network attacks with a firewallDetect and respond to network attacks with Intrusion Detection and Prevention (IDP)Design, install, and configure secure Virtual Private Networks (VPNs)Mitigate the impact of Denial-of-Service (DoS) attacks
Defending the Perimeter Course Outline
Setting Your Security Objectives

Defining security principles

Ensuring data Confidentiality, Integrity and Availability (CIA)
Assessing defensive techniques
Setting a generic security stance

Developing a security policy

Balancing risk with business requirements
Identifying your information assurance objectives
Choosing security technologies
Deploying a Secure Firewall
Detecting and Preventing Intrusion
Configuring Remote User Virtual Private Networks (VPNs)
Creating Site-to-Site VPNs
Integrating Perimeter Defenses

Request Quotes

Register now

Emotional Intelligence Essentials

Introduction to Test-Driven Development (TDD) Training

Business Analyst Soft Skills Training

Red Hat OpenStack Administration III Training with exam (CL311)

CompTIA PenTest+ Certification Training

Introduction to Microservices Architecture Training

Microsoft Security Operations Analyst Training (SC-200)

Securing your Customer with DNA (DNAS)

SharePoint 2016 Content Management Training for End Users

Red Hat System Administration I (RH124) Training

arالعربية