Price: $1,699.00

Length: 2 Days
Print Friendly, PDF & Email

Network Security Training

Network Security Training is a 2-day course applies the knowledge of network security in design, develop or integrate the secure networks.

Partiicipants are introducted to a set of labs, workshops and group activities of real world case studies in order to prepare you for the real-world problems and to be able to tackle all the related network security challenges.

Windows Security Fundamentals

The evolution of technology has transformed not only how we live and work but also how organizations must safeguard their digital assets.

Consequently, network security has never been more important.

Network security is a broad term that covers a multitude of technologies, devices and processes. In its simplest term, it is a set of rules and configurations designed to protect the confidentiality, integrity and availability of computer networks and data using both software and hardware technologies.

A well designed network security solution reduces overhead expenses and safeguards organizations from costly losses that occur from a data breach or other security incident. Ensuring legitimate access to systems, applications and data enables business operations and delivery of services and products to customers.

Besides the old standby firewalls, there are many other types of network security strategies now in use by organizations.  One popular strategy is network segmentation, which defines boundaries between network segments where assets within the group have a common function, risk or role within an organization.

As the technological sophistication of hackers evolve, so must effective network security strategies. In the past year, organizations have put increased focus on AI and machine learning.

Experts in this area believe AI has the potential to significantly disrupt traditional methods of network security. Machine learning algorithms can analyze vast amounts of data and identify patterns, anomalies, and potential vulnerabilities at speeds far beyond human capability.

Security bots have been receiving considerable attention in regards to network security.

Defensive bot controls are another term for automated programs and mechanisms designed to protect computer systems, networks, and web platforms from various security threats and attacks.

These bots operate in a variety of ways to safeguard digital assets and ensure the integrity, confidentiality, and availability of information.

Defensive automations include antivirus bots, which use signature-based detection, behavioral analysis, and heuristics to identify patterns and behaviors associated with known malware.

Network Security Training Course by Tonex

Network security training by Tonex introduces the importance of security in networks and helps you to understand the main components of a secured network. Network security training helps you examine the security related issues in networks and provides you with necessary preparation to secure the networks from attacks and exploits.

Integrated-Network-SoS

Added Value of Network Security Training

  • Public key infrastructure
  • Wireless local area network
  • WLAN security concepts
  • IPsec
  • Internet key exchange version 2 (IKEv2)
  • Security issues related to IPv4 or IPv6
  • Multi-protocol label switching security and network endpoint assessment control

Learn About

  • The main types of network attacks and security issues related to different networks
  • The IEEE standards for network security, main parts of networks and their security issues, and WLAN architecture
  • Wired equivalent privacy (WEP), virtual private network (VPN), static IPs, and access point replacement in network security training
  • The concept of TCP/IP, security issues related to internet protocol, standards for IP security, Authentication header protocol (AH), and internet key exchange
  • The difference between IPv4 and IPv6, different security issues related to IPv4, transitions for IPv6, and dual stack approach
  • The multi-protocol label switching (MPLS), MPLS security, label switching routers, MPLS quality of service and MPLS security tools
  • The endpoint assessment in networks, network access control agent/device/server, wireless infrastructure security, identity management and prepare yourself for next generation network architecture by learning the main drivers in next generation networks

Who Could Benefit from Network Security Training?

If you are an IT professional who specialize in network security, you will benefit the presentations, examples, case studies, discussions, and individual activities upon the completion of the introduction to secure software engineering training and will prepare yourself for your career.

Tonex Network Security Training Methodology

Network security training will introduce a set of labs, workshops and group activities of real world case studies in order to prepare you for the real-world problems and to be able to tackle all the related network security challenges.

Audience

Network security training is a 2-day course designed for:

  • IT professionals in the area of information security and network security
  • Executives and managers of network security and system engineering areas
  • Information technology professionals, network engineers, security analysts, policy analysts
  • Security operation personnel, network administrators, system integrators and security consultants
  • Security traders to understand the network security, or web security.
  • Investors and contractors who plan to make investments in system engineering industry.
  • Technicians, operators, and maintenance personnel who are or will be working on network security projects
  • Managers, accountants, and executives of cyber security industry.

Training Objectives

Upon completion of the network security training course, the attendees are able to:

  • Improve your understanding of network security
  • Apply the knowledge of network security in design, develop or integrate the secure networks
  • Apply logic, mathematics and science in engineering concept for a network system
  • Learn principles of network system design and implementation
  • Understand the different types of attacks in networks
  • Explain the concept of wireless local area network (WLAN)
  • Tackle the security issues in WLAN
  • Learn the IP security and internet key exchange concepts
  • Understand the multi-protocol label switching security issues in networks
  • Design and test the networks for secure applications with identifying attacks

Training Outline

The network security training course consists of the following lessons, which can be revised and tailored to the client’s need:

Network Security Basics

  • Introduction to Network Security
  • Data Security and Network Security
  • History of Network Security
  • Network Security Timeline
  • Internet Architecture and Vulnerable Security Aspect
  • IPv4 and IPv6 Architectures
  • Attacks through the IPv4
  • Common Internet Attack Methods
  • Eavesdropping
  • Viruses
  • Worms and Trojans
  • IP Spoofing Attacks
  • Denial of Service (Dos)
  • Phishing
  • Cryptographic Systems
  • Firewall
  • Secure Socket Layer (Ssl)
  • Security Issues of IPv6
  • Security in Different Networks
  • Current Developments in Network Security
  • Hardware/Software Development for Network Security

 Brief Overview of Public Key Infrastructure (PKI)

  • Definition of PKI
  • PKI Components
  • Applications and PKI Function
  • PKI Architectures
  • PKI Data Structures
  • PKI Services
  • PKI Related Standards

Wireless Local Area Network (WLAN)

  • Introduction to WLAN
  • IEEE Wireless Network Specifications
  • IEEE 802.11
  • Different WLAN Technologies
  • Narrowband
  • Spread Spectrum
  • Frequency Hopping Spread Spectrum (FHSS)
  • Direct Sequence Spread Spectrum (DSSS)
  • WLAN Frequency Usage
  • Peer to Peer Mode Versus Infrastructure Mode
  • Wireless Network Components
  • Access Point
  • PC Card
  • Router
  • PCI Adapter
  • WLAN Performance
  • Access Points and NICS
  • Radio Frequency Interference
  • Power Consumption Levels
  • Antenna Types
  • Aggregating Bandwidth
  • Wireless Security
  • Bluetooth Versus IEEE 802.11
  • Recent WLAN Solutions

WLAN Security

  • WLAN Architecture
  • Independent WLAN
  • Infrastructure WLAN
  • Microcells and Roaming
  • Security Threats of WLAN
  • Denial of Service
  • Spoofing and Session Hijacking
  • Eavesdropping
  • Wired Equivalent Privacy (WEP)
  • Weaknesses of WEP
  • Practical Solutions for WLAN Security
  • Changing Default SSID
  • Utilizing a VPN
  • Utilizing the Static IPs
  • Access Point Replacement
  • Minimizing the Radio Wave Propagation
  • New Standards for WLAN Security
  • PPP, EAP, TKIP, CCMP
  • Air-Defense
  • ISOMAIR Wireless Security
  • Wireless Security Auditor (WSA)

 Internet Protocol Security (IPsec) and Internet Key Exchange Version 2 (IKEv2)

  • TCP/IP Protocol
  • The IP Packet Format
  • Security Issues Related to Internet Protocol
  • Security Objectives of IPsec
  • IPsec Standardization
  • Overview of IPsec Architecture
  • IPsec Protocol Modes
  • Authentication Header (AH) Protocol
  • Encapsulating Security Payload (ESP) Protocol
  • IPsec Replay Protection
  • Security Association
  • Nesting Security Association
  • IPsec Security Policy
  • ISAKMP
  • Introduction to IKE
  • Computation of IKE Session Keys
  • IKE Authentication Methods
  • Main Mode Exchange
  • IPsec Processing

Transition Security Issues of IPv4 to IPv6

  • IPv4 Versus IPv6
  • IPv4 Security Issues
  • IPv6; Features
  • IPsec
  • Comparison Between IPv4 and IPv6
  • Transition Consideration in IPv6
  • IPv6to4 (Tunneling)
  • TRT (Translation)
  • Dual Stack Approach

Multi-Protocol Label Switching (MPLS) Security

  • Evolutions To MPLS
  • The MPLS Architecture
  • Label Switching Routers
  • MPLS Labels
  • Network Resilience
  • Virtual Private Networks
  • MPLS Traffic Engineering
  • MPLS Quality of Service
  • Security Issues in MPLS
  • Sample Tools iIn MPLS Security

Network Endpoint Assessment (Network Access Control)

  • Ensuring Integrity with Network Access Control
  • Network Access Control Device
  • Network Access Control Agent
  • Network Access Control Server
  • Secure Wireless Infrastructure
  • Endpoint Compliance System
  • Identity Management
  • Authentication
  • Exploitation in Network Access Control
  • Risks of Network Access Control

Next Generation Networks

  • Main Drivers to Next Generation Networks
  • Network Convergence
  • Heterogeneity of The Telecommunication Infrastructure
  • Applications of Next Generation Networks
  • Realization Example of Next Generation Networks
  • Growing Competition from other Sectors
  • GBE
  • Wireless in Next Generation Networks
  • Switches in Next Generation Networks
  • Servers in Next Generation Networks
  • Security Issues in Next Generation Networks
  • ITU-T Standard Model

Hands-On, Workshops and Group Activities

  • Labs
  • Workshops
  • Group Activities

Sample Workshops and Labs for Network Security Training

  • Eavesdropping Attacks and Prevention against Them
  • Isolating WLAN Traffic using Separate Firewall
  • Virtual Private Network over WAN
  • Security Management in Small Business Network
  • ICMP Ping ; Ping Traces and Link Failures
  • Firewall; Denying Multimedia Traffic with Proxy
  • VPN; Securing Non-Local Connections using Virtual Private Networks
  • VLAN; Generating User Logical Groups with Virtual LANs

Network Security Training

Request More Information

Please enter contact information followed by your questions, comments and/or request(s):
  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.