Skip to main content

Defending the Perimeter from Cyber Attacks Training

Code: 2010 Category: Tag:

This Defending the Perimeter from Cyber Attacks course will teach you to ensure the confidentiality, integrity, and availability of your organization’s information by protecting your communications and data. You will learn how to define and implement security principles, install and customize secure firewalls, build Virtual Private Network (VPN) tunnels, and safeguard your organization’s network perimeter against malicious attacks.

Basic security knowledge at the level of:
Course 468, System and Network Security Introduction
Working knowledge of TCP/IP and client server architecture

Defending the Perimeter from Cyber Attacks Training Delivery Methods
After-course instructor coaching benefit
4thdacad end-of-course exam included
Defending the Perimeter from Cyber Attacks Training Course Benefits
Fortify your network perimeter to provide an integrated defensePrevent or mitigate the effects of network attacks with a firewallDetect and respond to network attacks with Intrusion Detection and Prevention (IDP)Design, install, and configure secure Virtual Private Networks (VPNs)Mitigate the impact of Denial-of-Service (DoS) attacks
Defending the Perimeter Course Outline
Setting Your Security Objectives

Defining security principles

Ensuring data Confidentiality, Integrity and Availability (CIA)
Assessing defensive techniques
Setting a generic security stance

Developing a security policy

Balancing risk with business requirements
Identifying your information assurance objectives
Choosing security technologies
Deploying a Secure Firewall
Detecting and Preventing Intrusion
Configuring Remote User Virtual Private Networks (VPNs)
Creating Site-to-Site VPNs
Integrating Perimeter Defenses

Request Quotes

Register now

Please type the characters This helps us prevent spam, thank you.

Implementing and Operating Cisco Security Core Technologies (SCOR v1.0) Training

Introduction to C# Training

Microsoft Power Platform Fundamentals Training (PL-900)

COBIT® 2019 Foundation Training

Apache Kafka: Hands-On Training

Cyber Security Risk Assessment Training

Advanced Developing on AWS

Red Hat System Administration II Training with RHCSA Exam (RH135)

Ethical Hacking Essentials Labs

(PA-281) Traps: Install, Configure and Manage Training