Skip to main content

Defending the Perimeter from Cyber Attacks Training

Code: 2010 Category: Tag:

This Defending the Perimeter from Cyber Attacks course will teach you to ensure the confidentiality, integrity, and availability of your organization’s information by protecting your communications and data. You will learn how to define and implement security principles, install and customize secure firewalls, build Virtual Private Network (VPN) tunnels, and safeguard your organization’s network perimeter against malicious attacks.

Basic security knowledge at the level of:
Course 468, System and Network Security Introduction
Working knowledge of TCP/IP and client server architecture

Defending the Perimeter from Cyber Attacks Training Delivery Methods
After-course instructor coaching benefit
4thdacad end-of-course exam included
Defending the Perimeter from Cyber Attacks Training Course Benefits
Fortify your network perimeter to provide an integrated defensePrevent or mitigate the effects of network attacks with a firewallDetect and respond to network attacks with Intrusion Detection and Prevention (IDP)Design, install, and configure secure Virtual Private Networks (VPNs)Mitigate the impact of Denial-of-Service (DoS) attacks
Defending the Perimeter Course Outline
Setting Your Security Objectives

Defining security principles

Ensuring data Confidentiality, Integrity and Availability (CIA)
Assessing defensive techniques
Setting a generic security stance

Developing a security policy

Balancing risk with business requirements
Identifying your information assurance objectives
Choosing security technologies
Deploying a Secure Firewall
Detecting and Preventing Intrusion
Configuring Remote User Virtual Private Networks (VPNs)
Creating Site-to-Site VPNs
Integrating Perimeter Defenses

Request Quotes

Register now

PMI-Agile Certified Practitioner (PMI-ACP)® Training

Microsoft Azure Security Technologies Training (AZ-500)

Cisco Stealthwatch Network (SNO)

VMware Cloud on AWS Deploy and Manage 2021 Training (AWSDCM2021-OE)

Key Financial Metrics for Business Case Analysis

Collaborating in MS Teams: A Hands-On Approach

SAP Business Suite to SAP S/4HANA Delta (S4H01) Training

Business Analyst Soft Skills Training

Rust Essentials: Building Better Software

Designing and Implementing Microsoft DevOps Solutions Training (AZ-400)

arالعربية