I.T Security Essential Training

This course is the first step to learn the most effective steps to prevent cybercrime occurrences and identify threats with hands-on techniques that you can directly apply when you get back to work. You will learn from practical sessions delivered by professionals in the field with many years of experience.

User Avatar
(0 review)

About this Course

This course is the first step to learn the most effective steps to prevent cybercrime occurrences and identify threats with hands-on techniques that you can directly apply when you get back to work. You will learn from practical sessions delivered by professionals in the field with many years of experience. The knowledge attained will help you and your company that you can win the battle against the wide range of cyber adversaries that want to harm your environment. This course aims to enable students to understand properly how to secure and defend a network.

What You Will Learn?

  • Design and build a network architecture using VLANs, NAC, and 802.1x based on advanced persistent threat indicators of compromise
  • Apply what you learned directly to your job when you go back to work
  • Run Windows command line tools to analyse the system looking for high-risk items
  • Install VirtualBox and create virtual machines to create a virtual lab to test and evaluate tools/security of systems
  • Sniff open protocols like telnet, ftp, and determine the content, passwords, and vulnerabilities using Wireshark.
  • Create an effective policy that can be enforced within an organization and design a checklist to validate security and create metrics to tie into training and awareness
  • Identify visible weaknesses of a system using various tools and, once vulnerabilities are discovered, cover ways to configure the system to be more secure
  • Build a network visibility map that can be used for hardening of a network – validating the attack surface and covering ways to reduce that surface by hardening and patching
  • Causes of system data losses and breaches
  • How to identify compromised systems on your network.
  • The value of each security device and their accurate configuration.
  • Setting up suitable security metrics

Target Audience

  • Security professionals
  • Managers
  • Operations personnel
  • IT engineers and supervisors
  • Administrators
  • Forensic analysts, penetration testers, and auditors

Laptop Requirements

  • System running Windows 64-bit version
  • At least 8 GB RAM
  • 50 GB of available disk space (more space is recommended)
  • Administrator access to the operating system and all security software installed.
  • Anti-virus software will need to be disabled to install some of the tools.
  • An available USB port.
  • Machines should NOT contain any personal or company data.
  • Verify that under BIOS, Virtual Support is ENABLED.

Prerequisites

This course covers all of the core areas of security and assumes a basic understanding of technology, networks, and security

Course Curriculum

Total learning: 1 lesson Time: 2 days

    Network Security Essentials 1

    Defense-In-Depth and Attacks 0

    No items in this section

    Threat Management 0

    No items in this section

    Risk Management and Response 0

    No items in this section

    Windows Security 0

    No items in this section

ABOUT INSTRUCTOR

IFIS provides comprehensive and realistic business-critical Computer Based Training (CBT) solutions for those responsible for and/or considering a career in a typical heterogeneous computing environment.
Hello, my name is Peter. P Magemeso, and I am a security instructor at Institute of Forensics and ICT Security.

Reviews

Average Rating

0
0 rating

Detailed Rating

5 stars
0
4 stars
0
3 stars
0
2 stars
0
1 star
0