Skip to main content

Defending the Perimeter from Cyber Attacks Training

Code: 2010 Category: Tag:

This Defending the Perimeter from Cyber Attacks course will teach you to ensure the confidentiality, integrity, and availability of your organization’s information by protecting your communications and data. You will learn how to define and implement security principles, install and customize secure firewalls, build Virtual Private Network (VPN) tunnels, and safeguard your organization’s network perimeter against malicious attacks.

Basic security knowledge at the level of:
Course 468, System and Network Security Introduction
Working knowledge of TCP/IP and client server architecture

Defending the Perimeter from Cyber Attacks Training Delivery Methods
After-course instructor coaching benefit
4thdacad end-of-course exam included
Defending the Perimeter from Cyber Attacks Training Course Benefits
Fortify your network perimeter to provide an integrated defensePrevent or mitigate the effects of network attacks with a firewallDetect and respond to network attacks with Intrusion Detection and Prevention (IDP)Design, install, and configure secure Virtual Private Networks (VPNs)Mitigate the impact of Denial-of-Service (DoS) attacks
Defending the Perimeter Course Outline
Setting Your Security Objectives

Defining security principles

Ensuring data Confidentiality, Integrity and Availability (CIA)
Assessing defensive techniques
Setting a generic security stance

Developing a security policy

Balancing risk with business requirements
Identifying your information assurance objectives
Choosing security technologies
Deploying a Secure Firewall
Detecting and Preventing Intrusion
Configuring Remote User Virtual Private Networks (VPNs)
Creating Site-to-Site VPNs
Integrating Perimeter Defenses

Request Quotes

Register now

Splitting User Stories Training: Getting to Ready

Site Reliability Engineering Practitioner® (SREP) Certification Training

Implementing Cisco Enterprise SD-Branch (ENSDBI)

SAPTEC – Technology Fundamentals for SAP S/4HANA and SAP Business Suite Training

Microsoft Teams Voice Engineer Training (MS-720)

Crystal Reports Training

FPM 232 Training: Applications in Contracting

Certified Information Security Manager (CISM) Training and Certification

Red Hat Enterprise Linux Automation with Ansible (RH294)

WebSphere Application Server V9 Administration (WA590G)

arالعربية