System and Network Security Training

Course 468

  • Duration: 4 days
  • Labs: Yes
  • Language: English
  • 32 (ISC)2 CPE A Credits
  • Level: Foundation
Get This Course £2,095
  • 4-day instructor-led training course
  • Earn 23 NASBA credits (live, in-class training only)
  • After-course coaching available

  • After-course computing sandbox
  • Guaranteed to Run - you can rest assured that the class will not be cancelled.
    Jul 19 - 22 2:00 PM - 9:30 PM BST
  • Jul 25 - 28 9:00 AM - 4:30 PM BST
  • Aug 16 - 19 2:00 PM - 9:30 PM BST
  • Oct 10 - 13 9:00 AM - 4:30 PM BST
    London or AnyWare
  • Nov 1 - 4 1:00 PM - 8:30 PM GMT
    Herndon, VA or AnyWare
  • Dec 6 - 9 3:00 PM - 10:30 PM GMT
    Austin or AnyWare
  • Jan 16 - 19 9:00 AM - 4:30 PM GMT
    London or AnyWare
  • Jan 17 - 20 2:00 PM - 9:30 PM GMT
    New York or AnyWare
  • Feb 14 - 17 2:00 PM - 9:30 PM GMT
    Ottawa or AnyWare
  • May 2 - 5 2:00 PM - 9:30 PM BST
    Herndon, VA or AnyWare
  • May 8 - 11 9:00 AM - 4:30 PM BST
    London or AnyWare
  • May 30 - Jun 2 3:00 PM - 10:30 PM BST
    Austin or AnyWare

Scroll to view additional course dates

In this Network Security Training course, you will gain the foundational knowledge and skills to analyse and assess network risks, then select and deploy appropriate countermeasures. Through multiple hands-on exercises, you will learn how to:

  • Evaluate methods for strong authentication
  • Search for possible vulnerabilities in operating systems
  • Reduce your organisation’s exposure to dangers in enterprise-wide and virtual private networks (VPNs)

System and Network Security Training Delivery Methods

  • In-Person

  • Online

System and Network Security Training Benefits

  • Analyse your exposure to security threats

  • Protect your organisation's systems and data

  • Deploy firewalls and data encryption to minimise threats

  • Assess alternative user and host authentication mechanisms
  • Manage risks originating from inside the organisation and the internet

  • Leverage continued support with after-course one-on-one instructor coaching and computing sandbox

System and Network Security Training Outline

Real threats that impact cybersecurity

  • Hackers, internal and external
  • Eavesdropping
  • Spoofing
  • Sniffing
  • Trojan horses
  • Viruses
  • Wiretaps

A cyber security policy: the foundation of your protection

  • Defining your information assurance objectives
  • Assessing your exposure

Securing data with symmetric encryption

  • Choosing your algorithm: DES, AES, Rc4, and others
  • Assessing key length and key distribution

Solving key distribution issues with asymmetric encryption

  • Generating keys
  • Encrypting with RSA
  • PGP and GnuPG
  • Evaluating Web of Trust and PKI

Ensuring integrity with hashes

  • Hashing with Md5 and SHA
  • Protecting data in transit
  • Building the digital signature

Assessing traditional static password schemes

  • Creating a strong password policy to prevent password guessing and cracking
  • Protecting against social engineering attacks
  • Encrypting passwords to mitigate the impact of password sniffing

Evaluating strong authentication methods

  • Preventing password replay using one-time and tokenised passwords
  • Employing biometrics as part of multi-factor authentication

Authenticating hosts

  • Distrusting IP addresses
  • Mitigating address-spoofing issues and implementing countermeasures
  • Implementing solutions for wireless networks

Discovering system vulnerabilities

  • Searching for operating system vulnerabilities
  • Discovering file permission issues
  • Limiting access via physical security

Encrypting files for confidentiality

  • Encryption with application-specific tools
  • Recovering encrypted data

Hardening the operating system

  • Locking down user accounts
  • Securing administrator's permissions
  • Protecting against viruses

Scanning for vulnerabilities

  • Searching for rogue servers
  • Profiling systems and services

Reducing Denial of Service (DoS) attacks

  • Securing DNS
  • Limiting the impact of common attacks

Deploying firewalls to control network traffic

  • Preventing intrusions with filters
  • Implementing a cyber security policy
  • Deploying personal firewalls

Protecting web services and applications

  • Validating user input
  • Controlling information leakage

Threats from the LAN

  • Sniffing the network
  • Mitigating threats from connected hosts
  • Partitioning the network to prevent data leakage
  • Identifying wireless LAN vulnerabilities

Confidentiality on external connections

  • Ensuring confidentiality with encryption
  • Securing communication with IPsec

Need Help Finding The Right Training Solution?

Our training advisors are here for you.

System and Network Security Training FAQs

Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.

Yes, this is a foundation course, so you do not need to be an expert to gain great value from this course. You will gain knowledge and skills in network security that will help you protect your organisation's systems and data.

  • This course provides 23 'A-level' CPE credits toward maintaining your CISSP certification
  • This course covers multiple domains on the (ISC)2® CISSP certification exam
  • If you are interested in achieving the CISSP certification, see the CISSP® Training and Certification Prep Course