Price: $1,699.00

Length: 2 Days
Print Friendly, PDF & Email

Network Security Training

Network Security Training is a 2-day course applies the knowledge of network security in design, develop or integrate the secure networks.

Partiicipants are introducted to a set of labs, workshops and group activities of real world case studies in order to prepare you for the real-world problems and to be able to tackle all the related network security challenges.

Windows Security Fundamentals

Network security involves access control, virus and antivirus software, application security, network analytics, types of network-related security (endpoint, web, wireless), firewalls, VPN encryption and more.

Network security is an overarching term that describes hardware and software solutions as well as processes or rules and configurations relating to network use, accessibility, and overall threat protection.

Network security protects your network and data from breaches, intrusions and other threats.

Security as Code, Shift Left Security, and Security Automation are three of the most popular methodologies and frameworks for building a more secure network.

Network security has never been more important with the increased reliance on Cloud usage, global connectivity and IoT.

The evolving cyber threat landscape, including the rise of generative AI, has added to this problem. These growing threats have persuaded businesses to reconsider their security posture and ultimately boosted the demand for endpoint security software.

An endpoint can be considered as a device that enables an employee to connect to a corporate network.

Endpoint security software enables businesses to protect devices that employees use for work purposes or servers that are either on a network or in the cloud from cyber threats.

The main goal of any endpoint security solution is to protect data and workflows associated with all devices that connect to the corporate network. It does this by examining files as they enter the network and comparing them against an ever-increasing database of threat information, which is stored in the cloud.

Analysts often point out that there are many layers to consider when addressing network security across an organization. Attacks can happen at any layer in the network security layers model, so your network security hardware, software and policies must be designed to address each area.

Unquestionably, today’s network architecture is complex and is faced with a threat environment that is always changing and attackers that are always trying to find and exploit vulnerabilities.

These vulnerabilities can exist in a broad number of areas, including devices, data, applications, users and locations. Consequently, there are many network security management tools and applications in use today that address individual threats and exploits and also regulatory non-compliance.

The importance of effective network security is fully realized when you consider that just a few minutes of downtime can cause widespread disruption and massive damage to an organization’s bottom line and reputation, it is essential that these protection measures are in place.

Network Security Training Course by Tonex

Network security training by Tonex introduces the importance of security in networks and helps you to understand the main components of a secured network. Network security training helps you examine the security related issues in networks and provides you with necessary preparation to secure the networks from attacks and exploits.

Integrated-Network-SoS

Added Value of Network Security Training

  • Public key infrastructure
  • Wireless local area network
  • WLAN security concepts
  • IPsec
  • Internet key exchange version 2 (IKEv2)
  • Security issues related to IPv4 or IPv6
  • Multi-protocol label switching security and network endpoint assessment control

Learn About

  • The main types of network attacks and security issues related to different networks
  • The IEEE standards for network security, main parts of networks and their security issues, and WLAN architecture
  • Wired equivalent privacy (WEP), virtual private network (VPN), static IPs, and access point replacement in network security training
  • The concept of TCP/IP, security issues related to internet protocol, standards for IP security, Authentication header protocol (AH), and internet key exchange
  • The difference between IPv4 and IPv6, different security issues related to IPv4, transitions for IPv6, and dual stack approach
  • The multi-protocol label switching (MPLS), MPLS security, label switching routers, MPLS quality of service and MPLS security tools
  • The endpoint assessment in networks, network access control agent/device/server, wireless infrastructure security, identity management and prepare yourself for next generation network architecture by learning the main drivers in next generation networks

Who Could Benefit from Network Security Training?

If you are an IT professional who specialize in network security, you will benefit the presentations, examples, case studies, discussions, and individual activities upon the completion of the introduction to secure software engineering training and will prepare yourself for your career.

Tonex Network Security Training Methodology

Network security training will introduce a set of labs, workshops and group activities of real world case studies in order to prepare you for the real-world problems and to be able to tackle all the related network security challenges.

Audience

Network security training is a 2-day course designed for:

  • IT professionals in the area of information security and network security
  • Executives and managers of network security and system engineering areas
  • Information technology professionals, network engineers, security analysts, policy analysts
  • Security operation personnel, network administrators, system integrators and security consultants
  • Security traders to understand the network security, or web security.
  • Investors and contractors who plan to make investments in system engineering industry.
  • Technicians, operators, and maintenance personnel who are or will be working on network security projects
  • Managers, accountants, and executives of cyber security industry.

Training Objectives

Upon completion of the network security training course, the attendees are able to:

  • Improve your understanding of network security
  • Apply the knowledge of network security in design, develop or integrate the secure networks
  • Apply logic, mathematics and science in engineering concept for a network system
  • Learn principles of network system design and implementation
  • Understand the different types of attacks in networks
  • Explain the concept of wireless local area network (WLAN)
  • Tackle the security issues in WLAN
  • Learn the IP security and internet key exchange concepts
  • Understand the multi-protocol label switching security issues in networks
  • Design and test the networks for secure applications with identifying attacks

Training Outline

The network security training course consists of the following lessons, which can be revised and tailored to the client’s need:

Network Security Basics

  • Introduction to Network Security
  • Data Security and Network Security
  • History of Network Security
  • Network Security Timeline
  • Internet Architecture and Vulnerable Security Aspect
  • IPv4 and IPv6 Architectures
  • Attacks through the IPv4
  • Common Internet Attack Methods
  • Eavesdropping
  • Viruses
  • Worms and Trojans
  • IP Spoofing Attacks
  • Denial of Service (Dos)
  • Phishing
  • Cryptographic Systems
  • Firewall
  • Secure Socket Layer (Ssl)
  • Security Issues of IPv6
  • Security in Different Networks
  • Current Developments in Network Security
  • Hardware/Software Development for Network Security

 Brief Overview of Public Key Infrastructure (PKI)

  • Definition of PKI
  • PKI Components
  • Applications and PKI Function
  • PKI Architectures
  • PKI Data Structures
  • PKI Services
  • PKI Related Standards

Wireless Local Area Network (WLAN)

  • Introduction to WLAN
  • IEEE Wireless Network Specifications
  • IEEE 802.11
  • Different WLAN Technologies
  • Narrowband
  • Spread Spectrum
  • Frequency Hopping Spread Spectrum (FHSS)
  • Direct Sequence Spread Spectrum (DSSS)
  • WLAN Frequency Usage
  • Peer to Peer Mode Versus Infrastructure Mode
  • Wireless Network Components
  • Access Point
  • PC Card
  • Router
  • PCI Adapter
  • WLAN Performance
  • Access Points and NICS
  • Radio Frequency Interference
  • Power Consumption Levels
  • Antenna Types
  • Aggregating Bandwidth
  • Wireless Security
  • Bluetooth Versus IEEE 802.11
  • Recent WLAN Solutions

WLAN Security

  • WLAN Architecture
  • Independent WLAN
  • Infrastructure WLAN
  • Microcells and Roaming
  • Security Threats of WLAN
  • Denial of Service
  • Spoofing and Session Hijacking
  • Eavesdropping
  • Wired Equivalent Privacy (WEP)
  • Weaknesses of WEP
  • Practical Solutions for WLAN Security
  • Changing Default SSID
  • Utilizing a VPN
  • Utilizing the Static IPs
  • Access Point Replacement
  • Minimizing the Radio Wave Propagation
  • New Standards for WLAN Security
  • PPP, EAP, TKIP, CCMP
  • Air-Defense
  • ISOMAIR Wireless Security
  • Wireless Security Auditor (WSA)

 Internet Protocol Security (IPsec) and Internet Key Exchange Version 2 (IKEv2)

  • TCP/IP Protocol
  • The IP Packet Format
  • Security Issues Related to Internet Protocol
  • Security Objectives of IPsec
  • IPsec Standardization
  • Overview of IPsec Architecture
  • IPsec Protocol Modes
  • Authentication Header (AH) Protocol
  • Encapsulating Security Payload (ESP) Protocol
  • IPsec Replay Protection
  • Security Association
  • Nesting Security Association
  • IPsec Security Policy
  • ISAKMP
  • Introduction to IKE
  • Computation of IKE Session Keys
  • IKE Authentication Methods
  • Main Mode Exchange
  • IPsec Processing

Transition Security Issues of IPv4 to IPv6

  • IPv4 Versus IPv6
  • IPv4 Security Issues
  • IPv6; Features
  • IPsec
  • Comparison Between IPv4 and IPv6
  • Transition Consideration in IPv6
  • IPv6to4 (Tunneling)
  • TRT (Translation)
  • Dual Stack Approach

Multi-Protocol Label Switching (MPLS) Security

  • Evolutions To MPLS
  • The MPLS Architecture
  • Label Switching Routers
  • MPLS Labels
  • Network Resilience
  • Virtual Private Networks
  • MPLS Traffic Engineering
  • MPLS Quality of Service
  • Security Issues in MPLS
  • Sample Tools iIn MPLS Security

Network Endpoint Assessment (Network Access Control)

  • Ensuring Integrity with Network Access Control
  • Network Access Control Device
  • Network Access Control Agent
  • Network Access Control Server
  • Secure Wireless Infrastructure
  • Endpoint Compliance System
  • Identity Management
  • Authentication
  • Exploitation in Network Access Control
  • Risks of Network Access Control

Next Generation Networks

  • Main Drivers to Next Generation Networks
  • Network Convergence
  • Heterogeneity of The Telecommunication Infrastructure
  • Applications of Next Generation Networks
  • Realization Example of Next Generation Networks
  • Growing Competition from other Sectors
  • GBE
  • Wireless in Next Generation Networks
  • Switches in Next Generation Networks
  • Servers in Next Generation Networks
  • Security Issues in Next Generation Networks
  • ITU-T Standard Model

Hands-On, Workshops and Group Activities

  • Labs
  • Workshops
  • Group Activities

Sample Workshops and Labs for Network Security Training

  • Eavesdropping Attacks and Prevention against Them
  • Isolating WLAN Traffic using Separate Firewall
  • Virtual Private Network over WAN
  • Security Management in Small Business Network
  • ICMP Ping ; Ping Traces and Link Failures
  • Firewall; Denying Multimedia Traffic with Proxy
  • VPN; Securing Non-Local Connections using Virtual Private Networks
  • VLAN; Generating User Logical Groups with Virtual LANs

Network Security Training

Request More Information

Please enter contact information followed by your questions, comments and/or request(s):
  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.

Request More Information

  • Please complete the following form and a Tonex Training Specialist will contact you as soon as is possible.

    * Indicates required fields

  • This field is for validation purposes and should be left unchanged.