Requesting more information and/or the current price of this training is easy. We'll take any current promotions, subsidies, or customer discounts into account.
With this advanced network security course you can be among the few who transcend the old idea of the hacker having all the fun, take pride being the defender, form an offensive mindset to skillfully orchestrate robust and solid defenses and reinvent popular belief by beating the hacker at his own game.
You will be evaluating advanced “hacks” and methods of defense fortification bringing you closer to establishing perfect security by reviewing best practices and methodologies you can apply to secure environments, provide segmentation and isolation to reduce the effectiveness of the Advanced Persistent Threat.
The course will cover fundamental areas of fortifying your defenses; you will discover methods of developing a secure baseline and how to “harden” your enterprise architectures from the most advanced attacks. Once a strategy for a fortified perimeter is defined the course moves on to defending against the sophisticated malware that is on the rise today and the importance of “live” memory analysis and real time monitoring.
First Look Video
Firewall administrators, system architects, system administrators, windows admin or those responsible for or interested in:
Identifying security weaknesses in computer systems or networks
Exposing weaknesses for system's owners to fix breaches before being targets of compromise
Applying hacking and pen testing constructively to defend against various possible attacks
Analysing best practices in developing secure system and network configurations
Establishing a secure baseline in deploying machines in a protected state
Appreciating popular attack methods applied by hackers in order to fortify their systems
NOTE: This is definitely not a beginner’s course; participants will be expected to possess the knowledge of attempting attacks against a variety of platforms and architectures under the supervision of an expert.
4 dagen (inclusief examen)
Module 1: Firewalls
Module 2: Advanced Filtering
Module 3: Firewall Configuration
Module 4: Hardening: Establishing a Secure Baseline
Module 5: Intrusion Detection and Prevention?
Module 6: Protecting Web Applications
Module 7: Memory Analysis
Module 8: Endpoint protection
Module 9: Securing Wireless
Train smarter, not harder. TSTC’s unique method ensures you actually master the skills—and pass with confidence.
Learn more about TSTC