Network Security Administrator
The Network Security course looks at the network security in defensive view while the Ethical Hacking certification program looks at the security in offensive mode. The Network Security program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network and to develop security policies that will protect an organization’s information.
Network Security course will help students learn how to evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities and defend against them.
Network Security Course Key Learning
How to Design and Analyze Secure Networked Systems
Cybersecurity Concepts and Security Principles Protect Data Access and Verify Source of Trust
Using GPG to Sign/Verify Software
Setup Secure Server and Client Certificate
Course Content:
Module 1: Introduction to Network Security
- Network topology; Network Types and the OSI Model
Module 2: Network Protocols
- Network Protocols: SLIP; PPP; ARP; RARP; IGMP; ICMP; SNMP, HTTP
- IP: Attacks and Countermeasures
- TCP, UDP: Attacks and Countermeasures
- FTP, TFTP, TELNET, SMTP: Vulnerabilities
Module 3: Security Policy
- What is Security Policy?
- What Defines a good security policy
- Security Policy Structure
- Developing and Implementing security policies
- Requirements of Effective Security Policy
Module 4: Physical Security
- Physical Security Threats
- Locks and Keys
- TEMPEST
- Fire Safety: Fire Suppression, Gaseous Emission Systems
- Laptop Security: Physical Security Countermeasures
- Biometric Devices
- PC Security: Boot Access
Module 5: Network Attacks
- Current Statistics
- Defining Terms: Threats, Attack and Exploit
- Classification of Hackers and Attacks
- Spoofing; Spamming; Eaves Dropping; Phishing; War Dialing; Password Cracking
- Web Page Defacement; SQL Injection; Wire Tapping; Buffer Overflow
- War Driving; War Chalking; War Flying
- Denial of Service (DOS) Attacks and Distributed DOS
Module 6: Intrusion Detection System
- Characteristics of IDS
- Host based IDS Vs Network based IDS
- IDS Detection Methods; Types of Signatures
- Intrusion Prevention System
- IDS Vs IPS
- IPS Tool
Module 7: Firewalls
- Handling threats and security tasks
- Protection against hacking
- Centralization and Documentation
- Multi-layer firewall protection
- Packet filtering and Stateful Packet Filtering
- Multi firewall DMZ
- Specialty firewalls and Reverse firewalls
Module8: Packet Filtering and Proxy Servers
- Network Address Translation
- Application layer gateway and Proxying
- Virtual Private Network and the Authentication process
Module 9: Bastion Host and Honeypots
- Bastion Host
- Honeypots and Honeynet
Module 10: Hardening Routers
- Internet work Operating Systems (IOS)
- Troubleshooting a router
- Hardening a Router
- Components of router security
- Router security: testing tools
Final Project
Lab Work (Online Class Available)
- Using Kali Linux and Virtual Machines
- Testing Network Security
- Working with Client / Server Environment
TARGET AUDIENCE
- System administrators
- Network administrators
- Anyone who is interested in network security technologies
CompTIA A+ Certification Practice Exam
CISCO Practice Exam Questions
- CCNA CISCO Certified Network Associate 200-301 PART 1
- CCNA CISCO Certified Network Associate 200-301 PART 2
- CCNA CISCO Certified Network Associate 200-301 PART 3
International Student Fee: 300 USD | 1,125 AED | 1,125 SAR
Job Interview Preparation (Soft Skills Questions & Answers)
- Tough Open-Ended Job Interview Questions
- What to Wear for Best Job Interview Attire
- Job Interview Question- What are You Passionate About?
- How to Prepare for a Job Promotion Interview
🎥 Your FREE eLEARNING Courses (Click Here)
Internships, Freelance and Full-Time Work opportunities
Flexible Class Options
- Week End Classes For Professionals SAT | SUN
- Corporate Group Trainings Available
- Online Classes – Live Virtual Class (L.V.C), Online Training
Related CEH Courses
Offensive Security Certified Professional (OSCP)
Certified Ethical Hacking (CEH) Course
Microsoft Azure Administrator AZ-104
CHFI Computer Hacking Forensic Investigator Certification
LPT Licensed Penetration Tester Certification