In this 3-day workshop, students gain a comprehensive understanding of how architecture design and security controls can be combined to reduce the risk of cyber attacks in enterprise environments.
OBJECTIVES
Understanding how data travels from an attacker system to your corporate or home network is critical. Many successful attacks occur due to misconfigured devices, such as routers or firewalls. Cyber criminals take advantage of weaknesses in controls and ride insecure architectures to carry out nefarious activities.
This course provides a comprehensive understanding of how data travels across the Internet and through your network. The path packets take is analyzed along with devices that can be used to minimize risk and provide a defense-in-depth posture. Our primary objective is to provide you with an understanding of architecture design and security controls that can be applied to reduce risk to enterprise environments.
- Understand the major types of controls
- Implement packet filtering, Proxy firewalls and Stateful firewalls
- Identify security risks and design strategies to protect against intruders
- Identify different types of hacker activities and the security policy necessary to prevent hacker penetration
- Establish an effective security policy
OUTLINE
- PERIMETER FUNDAMENTALS
- EXTENDING THE PERIMETER
Duration
3 days (18 hours)
Professional Training for Modern Technology Teams
Open Enrollment Courses
Open enrollment courses are a great, cost-effective option for organizations that have an immediate need to train a small number of employees.
Customized Training Programs
Customized training programs can be delivered on-site, in our training lab, or online to help organizations enhance the skills of their internal development teams.