Fundamentals of Network Security

Network Academy Eğitimlerini İnceleyin!

Fundamentals of Network Security

Module 1: Preparing to Secure InformationLessons

• Explaining How Assets Are Attacked
• Explaining How Assets Are Secured

Lab : Preparing to Secure Information

Module 2: Implementing Security-Enhanced Computing BaselinesLessons

• Introduction to Trusted Computing Bases
• Establishing a Security Baseline
• Monitoring a Security Baseline
• Helping to Secure Computers Physically
• Maintaining a Security Baseline

Lab : Maintaining Baseline Security

Module 3: Helping to Protect Information Using Authentication and Access ControlLessons

• Introduction to Access Control
• Implementing an Authentication Strategy
• Implementing an Access Control Strategy

Lab : Securing Accounts (MBSA)

Module 4: Using Cryptography to Help Protect InformationLessons

• Introduction to Cryptography
• Using Symmetric Encryption
• Using Hash Functions
• Using Public Key Encryption

Lab : Using Cryptography to Help Protect Information

Module 5: Using a PKI to Help Protect InformationLessons

• Introduction to Certificates
• Introduction to Public Key Infrastructure
• Deploying and Managing Certificates

Lab : Using Certificates

Module 6: Securing Internet Applications and ComponentsLesson

• Helping to Protect Web Servers
• Configuring Security for Common Internet Protocols
• Configuring Security for Web Browsers
• Configuring Security for Databases

Lab : Securing Web ServersLab : Protecting Clients from Active Content

Module 7: Implementing Security for E-Mail and Instant MessagingLessons

• Securing E-Mail Servers
• Securing E-Mail Clients
• Securing Instant Messaging

Lab : Securing Mail Servers

Module 8: Managing Security for Directory Services and DNSLessons

• Helping protect Directory Services Against Common Threats
• Helping Protect DNS Against Common Threats

Lab : Managing Security for Directory Services and DNS

Module 9: Securing Data TransmissionLessons

• Identifying Threats to Network Devices
• Implementing Security for Common Data Transmission
• Implementing Security for Remote Access
• Implementing Security for Wireless Network Traffic

Lab : Securing Data TransmissionLab : Using IPSec to Secure Data Transmission

Module 10: Implementing and Monitoring Security for Network PerimetersLessons

• Introduction to Network Perimeters
• Implementing Security on Inbound and Outbound Network Traffic
• Monitoring Network Traffic

Lab : Implementing and Monitoring Security for Network Perimeters

Module 11: Managing Operational SecurityLessons

• Establishing Security Policies and Procedures
• Educating Users about Security Policies
• Applying Security Policies to Operational Management
• Resolving Ethical Dilemmas When Helping to Protect Assets

Lab : Managing Operational Security

Module 12: Preserving Business ContinuityLessons

• Preparing to Recover from Disasters
• Communicating the Impact of Risks
• Performing a Security-Enhanced Backup and Recovery

Lab : Preserving Business Continuity

Module 13: Responding to Security IncidentsLessons

• Identifying Security Incidents
• Responding to Security Incidents
• Investigating Security Incidents

Lab : Responding to Security Incidents