Print Friendly, PDF & Email

Networks Cyber Threats Training, a 2-Day Network Cyber Threat Overview Training Course

Networks Cyber Threats Training covers principles of cybersecurity and cyber  threats in traditional and modern networks. Learn how you can create Cyber Threat Assessment Programs to look deep into your organization’s network traffic and look for Indicators of Compromise. Networks Cyber Threats Training provides attendees a blueprint on how to reduce risk and at the same time make their network more efficient.
Tonex’s Networks Cyber Threats Training program shows you how to uncovers unknown risks, and provide immediate mitigation strategies. Learn how to take a detailed look and assess at your network’s current security accuracy, application usage, user productivity and performance through expert guidance from TONEX.

Learn about:

  • Principles of Security Process
  • The Ultimate Goal of the Network  Security Process
  • Threats
  • Confidentiality, Integrity and Availability (CIA)
    Prevention, Detection, Response and CIA
  • Common Attack Methods & Techniques
  • Top 10 threats
  • Firewalls
  • Intrusion Detection/Prevention System
  • Authentication
  • Symmetric Key Ciphers
  • Public Key Cryptography
  • Infrastructure and Certificates
  • Elliptic Curve Cryptography (ECC)
  • Certificates and the Public Key Infrastructure (PKI)
  • Public Key Cryptography Standards (PKCS)
  • X.509 certificate
  • Private Key File Formats
  • Attacks on Public Key Infrastructure and Certificates
  • Secure Socket Layer/Transport Layer Security (SSL/TLS) Protocols
  • Virtual Private Networks (VPN)
  • Internet Protocol Security (IPsec)
  • The Internet Key Exchange (IKE)
  • Network Access Control (NAC)
  • Cyber Threats and Their Defense
  • Domain Name System (DNS) Protection
  • Router Security
  • Spam/Email Defensive Measures
  • Phishing Defensive Measures
  • Web-Based Attacks
  • Database Defensive Measures
  • Botnet Attacks and Applicable Defensive Techniques

Course Content and Agenda

Cyber Security Overview

  • Classic sense of a planned attack
  • Trends in the Types of Attacks
  • Network Vulnerability Analysis
  • Security Configuration Settings
  • Obfuscation and Mutations
  • The Attacker’s Motivation and Tactics
  • Network and Infrastructure Defense Principles
  • Mobile devices Cybersecurity Threats
  • Principles for protecting confidentiality
  • Principles for ensuring integrity
  • Principles for maintaining availability

Overview of Network Security and Operations œ

  • Network and Security Operations Data Analysis œ
  • Network Analysis œ
  • Tools and techniques to monitor the application traffic traversing your network
  • Intrusions, malware and malicious applications
  • Baseline Network Operations œ
  • Cybersecurity Threats
  • Preparing for Security Incidents œ
  • Detecting Security Incidents œ
  • Investigating Security Incidents œ
  • Reacting to an Incident œ

Key Network Threat Findings Across Industries

  • Hackers and techniques to compromise corporate data
  • Network Threats and Usage Trends
  • End-to-end security solutions
  • Mitigate the risks
  • cross-industry vulnerabilities and network usage trends
  • Automated Attack Systems
  • Botnets and Malware
  • Automated systems and tools
  • Methods and techniques  to probe networks for exploitable vulnerabilities
  • Tools to exploit application vulnerability
  • Application control
  • Social Media
  • Video Streaming
  • Advertising
  • Sophisticated trojans and land-and-expand attack strategies
  • Techniques to infiltrate and persist within your network
  • Drive-by-download or infected website
  • Actionable Insights to Protect Your Network

Emerging Technologies

  • Network and Information Infrastructure Virtualization
  • SDN and NFV
  • Virtual Machine Monitor
  • Virtual Networking
  • Data Center Virtualization
  • Cloud Computing

Network Design Principles

  • Network Security Controls
  • Mitigation Techniques
  • Risk Reducing
  • Incident Preparedness
  • Forensic Readiness

Network Intrusion Principles

  • Methods of Attack
  • Asymmetric Routing
  • Buffer Overflow Attacks
  • Common Gateway Interface Scripts
  • Protocol-Specific Attacks
  • Traffic Flooding
  • Trojans
  • Worms
  • Rootkit

Overview of Common Network Threats and Mitigation Techniques

  • Common attack methods & techniques
  • Methods to classify threats
  • What are the common threats
  • What it can do
  • What you can do
  • Botnets
  • Distributed denial-of-service (DDoS) attack
  • Hacking
  • Malware
  • Malicious software
  • Pharming
  • Phishing
  • Ransomware
  • Spam
  • Spoofing
  • Spyware
  • Trojan Horses
  • Viruses
  • Wireless Eavesdropping
  • Wi-Fi Eavesdropping
  • Worms

Overview of TEMPEST Certification Program (TCP)

  • National Security Agency (NSA) Programs
  • TEMPEST Principles and Descriptions
  • Certified TEMPEST Manufacturer Program
  • Certified TEMPEST Test Services Program.
  • Telecommunications and automated information-processing equipment design, development

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.