About this Course
This course is the first step to learn the most effective steps to prevent cybercrime occurrences and identify threats with hands-on techniques that you can directly apply when you get back to work. You will learn from practical sessions delivered by professionals in the field with many years of experience. The knowledge attained will help you and your company that you can win the battle against the wide range of cyber adversaries that want to harm your environment. This course aims to enable students to understand properly how to secure and defend a network.
What You Will Learn?
- Design and build a network architecture using VLANs, NAC, and 802.1x based on advanced persistent threat indicators of compromise
- Apply what you learned directly to your job when you go back to work
- Run Windows command line tools to analyse the system looking for high-risk items
- Install VirtualBox and create virtual machines to create a virtual lab to test and evaluate tools/security of systems
- Sniff open protocols like telnet, ftp, and determine the content, passwords, and vulnerabilities using Wireshark.
- Create an effective policy that can be enforced within an organization and design a checklist to validate security and create metrics to tie into training and awareness
- Identify visible weaknesses of a system using various tools and, once vulnerabilities are discovered, cover ways to configure the system to be more secure
- Build a network visibility map that can be used for hardening of a network – validating the attack surface and covering ways to reduce that surface by hardening and patching
- Causes of system data losses and breaches
- How to identify compromised systems on your network.
- The value of each security device and their accurate configuration.
- Setting up suitable security metrics
- Security professionals
- Operations personnel
- IT engineers and supervisors
- Forensic analysts, penetration testers, and auditors
- System running Windows 64-bit version
- At least 8 GB RAM
- 50 GB of available disk space (more space is recommended)
- Administrator access to the operating system and all security software installed.
- Anti-virus software will need to be disabled to install some of the tools.
- An available USB port.
- Machines should NOT contain any personal or company data.
- Verify that under BIOS, Virtual Support is ENABLED.
This course covers all of the core areas of security and assumes a basic understanding of technology, networks, and security