Introductions
Network Security and Firewalls teaches you how to secure your network from unauthorized activity. This course teaches you about security principles, such as establishing an effective security policy, and about the different types of hacker activities that you are most likely to encounter.
Prerequisites
Students must have completed the CIW Foundations and CIW Internetworking Professional series or be able to demonstrate equivalent Internet knowledge.
Nbiz Infosol provides this course in UAE specifically in Abu Dhabi, Dubai, Ajman, RAK, Al Ain, Umm Al Quwain and other areas
Course Objectives
This course will define security and explain the need for network security, identify resources that need security and list security standards and organizations. It will explain the need for access control methods and describe the function of an access control list. It will describe the universal guidelines and principles for effective network security. Discuss network security management applications. Describe the role a firewall plays in a company’s security policy. This course will explain on securing resources, Firewalls and Virtual Private Networks, Levels of Firewall Protection, Detecting and Distracting Hackers.
Duration & Learning Level
Learning Level: Intermediate
Duration: 2day(s)
<<Back to schedule | |||
Training Provider | Nbiz Infosol | Course Name | |
Candidate Name * | Company Name | ||
Student Type | Student Type ID | ||
Student ID Number | Mobile # * | ||
Email* | Registration Ref | ||
Name of Course | Scheduled Dates | Venue | Registration Link |
Network Security and Firewall | To be determined | Dubai, UAE | Register Now »» |
Network Security and Firewall | To be determined | Kuwait City, Kuwait | Register Now »» |
Network Security and Firewall | To be determined | Cairo, Egypt | Register Now »» |
Network Security and Firewall | To be determined | Baghdad, Iraq | Register Now »» |
Network Security and Firewall | To be determined | Beirut, Lebanon | Register Now »» |
Network Security and Firewall | To be determined | Jeddah, Suadi Arabia | Register Now »» |
Network Security and Firewall | To be determined | Chennai, India | Register Now »» |
Network Security and Firewalls | To be determined | Tehran, Iran | Register Now »» |
Network Security and Firewalls | To be determined | Muscat, Oman | Register Now »» |
Network Security and Firewalls | To be determined | Riyadh, Saudi Arabia | Register Now »» |
Network Security and Firewalls | To be determined | Abu Dhabi, UAE | Register Now »» |
Network Security and Firewalls | To be determined | Chennai, India | Register Now »» |
Network Security and Firewalls | To be determined | Abu Dhabi, UAE | Register Now »» |
Nbiz delivers this course in Abu Dhabi, Dubai, RAK, Ajman, Sharjah, Kuwait, Oman, Saudi, Bahrain , egypt and other places in the UAE and in the Middle East
Participants will learn the essential components of a network. Formulate the basics of an effective security policy and identify the key user authentication methods. List the three main encryption methods used in internetworking. Explain the need for auditing and differntiate the specific types of security attacks. Review on the Technical elements and appropriate controls. Our courses offers an interactive and informative discussion and giving you the best combination.
What Is Security?
- Network Security Background
- What Is Security?
- Hacker Statistics
- What Is the Risk?
- The Myth of 100-Percent Security
- Attributes of an Effective Security Matrix
- What You Are Trying to Protect
- Who Is the Threat?
- Security Standards
Elements of Security
- Security Concepts and Mechanisms
- Elements of Security
- The Security Policy
- Encryption
- Authentication
- Specific Authentication Techniques
- Access Control
- Auditing
- Security Tradeoffs and Drawbacks
Applied Encryption
- Reasons to Use Encryption
- Creating Trust Relationships
- Rounds, Parallelization and Strong
- Encryption
- Symmetric-Key Encryption
- Symmetric Algorithms
- Asymmetric Encryption
- Hash Encryption
- Applied Encryption Processes
- Encryption Review
Types of Attacks
- Attack Categories
- Brute-Force and Dictionary Attacks
- System Bugs and Back Doors
- Social Engineering and Non-Direct
- Attacks
General Security Principles
- Introduction
- Be Paranoid
- You Must Have a Security Policy
- No System or Technique Stands Alone
- Minimize the Damage
- Deploy Companywide Enforcement
- Provide Training
- Use an Integrated Security Strategy
- Place Equipment According to Needs
- Identify Security Business Issues
Protocol Layers and Security
- TCP/IP Security Introduction
- TCP/IP and Network Security
- The TCP/IP Suite and the OSI
- Reference Model
- Physical Layer
- Network Layer
- Transport Layer
- Application Layer
Securing Resources
- TCP/IP Security Vulnerabilities
- Implementing Security
- Resources and Services
- Protecting TCP/IP Services
- Simple Mail Transfer Protocol (SMTP)
- Testing and Evaluating
- Implementing New Systems and Settings
- Security Testing Software
- Security and Repetition
Firewalls and Virtual Private Networks
- Access Control Overview
- Definition and Description of a Firewall
- The Role of a Firewall
- Firewall Terminology
- Firewall Configuration Defaults
- Creating Packet Filter Rules
- Packet Filter Advantages and
- Disadvantages
- Configuring Proxy Servers
- Remote Access and Virtual Private
- Networks (VPNs)
- Public Key Infrastructure (PKI)
Levels of Firewall Protection
- Designing a Firewall
- Types of Bastion Hosts
- Hardware Issues
- Common Firewall Designs
- Putting It All Together
Detecting and Distracting Hackers
- Preparing for the Inevitable
- Proactive Detection
- Distracting the Hacker
- Deterring the Hacker
Incident Response
- Planning for Response
- Create a Response Policy
- Decide Ahead of Time
- Do Not Panic
- Document Everything
- Assess the Situation
- Stop or Contain Activity
- Execute the Response Plan
- Analyze and Learn
This is an advanced learning level course which consists of a 12-hour duration.
The participant will be entitled for a certification of Certified Network Security Professional.
1. How do I enroll/register for the training course?
To enroll or register to any training course, you can use the registration page from training page or fill the request a call back form from each course pages.
The following page will provide you a list of course and training that we are providing based on the category and from each course item you can see the course details.
URL: http://www.nbizinfosol.com/training.aspx
Another method is to fill a Request a call back form provided in each Training/Course pages.
2. What will I get along with this training?
We are providing course materials during training and completion certificate after succesful training.
3. Do I need to fill up a registration form?
Yes. you can fill the registration form avaialble in the website or you can directly call us to enroll the course.Our executives will guide you to do further steps.
4. Does the course fees include the examination fee as well?
Based upon the course you are enrolling, we will charge the exam fee . We will give you the details of course fee and exam fee anytime to clear it.
5. Do you provide any course completion certificate?
Yes. We are providing the Course completion certificate for all courses we are providing.
6. Do you provide assistance for the exam appliation process?
Yes. We will provide assistance and support to apply for any exam.
7. What is the mode of payment?
Two types of payment available:
1. Visit our office and pay direct,You are always welcome to Nbizinfosol.
2. We are providing online payment via paypal payment gateway.Based upon your request we will provide the link to access the payment page.
Network Server Administrators Firewall Administrators Systems Administrators Application Developers IT Security Officers
Note: The listed information (venue, schedule, duration and content) may be modified and customized as per the requirements.