Security Architecture and Controls

In this 3-day workshop, students gain a comprehensive understanding of how architecture design and security controls can be combined to reduce the risk of cyber attacks in enterprise environments.

OBJECTIVES

Understanding how data travels from an attacker system to your corporate or home network is critical. Many successful attacks occur due to misconfigured devices, such as routers or firewalls. Cyber criminals take advantage of weaknesses in controls and ride insecure architectures to carry out nefarious activities.

This course provides a comprehensive understanding of how data travels across the Internet and through your network.  The path packets take is analyzed along with devices that can be used to minimize risk and provide a defense-in-depth posture. Our primary objective is to provide you with an understanding of architecture design and security controls that can be applied to reduce risk to enterprise environments.

  • Understand the major types of controls
  • Implement packet filtering, Proxy firewalls and Stateful firewalls
  • Identify security risks and design strategies to protect against intruders
  • Identify different types of hacker activities and the security policy necessary to prevent hacker penetration
  • Establish an effective security policy

OUTLINE

  • PERIMETER FUNDAMENTALS
  • EXTENDING THE PERIMETER

Duration

3 days (18 hours)

Professional Training for Modern Technology Teams

Sign up today for open enrollment technology training.

Open Enrollment Courses

Open enrollment courses are a great, cost-effective option for organizations that have an immediate need to train a small number of employees.

View Course Schedule

Customized technology training designed to meet your team's specific needs

Customized Training Programs

Customized training programs can be delivered on-site, in our training lab, or online to help organizations enhance the skills of their internal development teams.

Request More Information

secret