Skip to main content

Defending the Perimeter from Cyber Attacks Training

Code: 2010 Category: Tag:

This Defending the Perimeter from Cyber Attacks course will teach you to ensure the confidentiality, integrity, and availability of your organization’s information by protecting your communications and data. You will learn how to define and implement security principles, install and customize secure firewalls, build Virtual Private Network (VPN) tunnels, and safeguard your organization’s network perimeter against malicious attacks.

Basic security knowledge at the level of:
Course 468, System and Network Security Introduction
Working knowledge of TCP/IP and client server architecture

Defending the Perimeter from Cyber Attacks Training Delivery Methods
After-course instructor coaching benefit
4thdacad end-of-course exam included
Defending the Perimeter from Cyber Attacks Training Course Benefits
Fortify your network perimeter to provide an integrated defensePrevent or mitigate the effects of network attacks with a firewallDetect and respond to network attacks with Intrusion Detection and Prevention (IDP)Design, install, and configure secure Virtual Private Networks (VPNs)Mitigate the impact of Denial-of-Service (DoS) attacks
Defending the Perimeter Course Outline
Setting Your Security Objectives

Defining security principles

Ensuring data Confidentiality, Integrity and Availability (CIA)
Assessing defensive techniques
Setting a generic security stance

Developing a security policy

Balancing risk with business requirements
Identifying your information assurance objectives
Choosing security technologies
Deploying a Secure Firewall
Detecting and Preventing Intrusion
Configuring Remote User Virtual Private Networks (VPNs)
Creating Site-to-Site VPNs
Integrating Perimeter Defenses

Request Quotes

Register now

Architecting on AWS

FPM 231 Training: Applications in Project and Program Management

Achieving Success as a New Manager

PRINCE2® Foundation 6th Edition

Cisco Prime 3.2 with WLC 8.4 Workshop (CPWW)

Apache Kafka: Hands-On Training

RHCSA Rapid Track Course With Exam (RH200)

Implementing and Configuring Cisco Identity Services Engine (SISE)

Time Management Training

Translating Strategy Into Results: Duke CE Certificate Course

arالعربية