________________________________________________________________
Do you want to take this course remotely or in person?
Contact us by email: info@nanforiberica.com , phone: +34 91 031 66 78, WhatsApp: +34 685 60 05 91 , or contact Our Offices
________________________________________________________________
Course description. Network security
This course is taught in online mode and consists of 15 units. The duration of the course is 4 0 hours That distributes between content and collaboration tools. Upon completion, the student will receive an accrediting diploma.
Training is done through our Virtual Campus , with this modality you will have all the didactic content on the course platform and it will be accessible, from the start day of the course, 24 hours a day, every day of the week. The student will also have participation forums , as well as a continuous tutoring .
The course is taught in teletraining modality (100% bonus option). In-person and remote training actions can also be carried out on demand.
Course objectives
Computer networks are constantly growing and are connecting to the Internet as a result of e-commerce, productivity and access to information. Therefore, this course wants to illustrate to students the possible risks they may suffer on the Internet. For this purpose, this course talks about everything that refers to Internet security: digital signatures, encryption, firewalls, security risks, basic connections with databases through ADO .NET and finally you will learn to create components.
Addressed to
System administrators and people who want to delve into security issues.
Course content
Unit I: Security Risk Assessment
1.1 Data
1.2 Services
1.3 Attacks
1.4 Security certifications
1.5 Network security
Unit II: Windows 2000 Concepts
2.1 Active Directory logical structures
2.2 Trust relationships
2.3 Manage using Group Policy
2.4 Kerberos v5 authentication process
2.5 Validation using certificates
2.6 NTLM Validation
2.7 Security SID
2.8 Access to resources
2.9 User group
Unit III: Administration
3.1 Administrative models
3.2 Administrative tasks
3.3 User groups
3.4 Remote administration
Unit IV: User Accounts
4.1 Policy design
4.2 Policy enforcement levels
4.3 Effective application of policies
4.4 User accounts
4.5 Audits
4.6 Audit plan
Unit V: Windows 2000 computer security
5.1 Physical network security
5.2 Password security
5.3 Security requirements
5.4 Default security of W2K machines
5.5 Compatibility of non-W2K certified applications
5.6 Using incremental templates
5.7 Template configuration
5.8 New directives
Unit VI: Resource Security
6.1 File systems
6.2 Use of the DACL
6.3 Shared permissions
6.4 NTFS permissions
6.5 Printing Resources
6.6 Registry Protection
6.7 Data encryption
6.8 Audit access to resources
6.9 Backup Tasks
Unit VII: Secure communication channels
7.1 Communications risks
7.2 Encryption of communication channels
7.3 Security of application protocols
7.4 Secure file transmissions
7.5 Webcasts
7.6 E-mail transmissions
7.7 Using IPSec
Unit VIII: Non-Microsoft Client Access
8.1 UNIX
8.2 UNIX client authentication
8.3 Ensure access to files
8.4 Interoperability with Novell
8.5 Novell Client Authentication
8.6 Secure access to Novell resources
8.7 Interoperability with Macintosh
8.8 Mac Client Authentication
8.9 Risks of services in heterogeneous networks
Unit IX: Remote Client Access
9.1 Risks of RAS services
9.2 RAS Authentication
9.3 Authorize remote connections
9.4 Remote access policies
9.5 RAS Directive Model
9.6 Support remote access from NT 4.0 servers
9.7 Definition of call security
9.8 Benefits of VPN connection
9.9 Using RADIUS
Unit X: Access to remote offices
10.1 Public and private networks
10.2 Router security
10.3 Windows 2000 Routers
10.4 Security requirements
Unit XI: Internet user access
11.1 Common attacks
11.2 Denial of service attacks
11.3 Port scanning
11.4 Internal network protection
11.5 Protocol filter through Firewall
11.6 Customer entry from the Internet
11.7 Firewall topologies, screened subnets
11.8 Availability
11.9 Sceened Internet Traffic Security
Unit XII: User access to the Internet
12.1 Internal network protection
12.2 Internet access policies
12.3 Planning firewalls (ISA Server)
12.4 Internet access
Unit XIII: Extension of the network to business partners
13.1 Information exchanges
13.2 Service security
13.3 Remote partners
13.4 Logical security organizations
13.5 Authentication
Unit XIV: PKI Design
14.1 Key infrastructure
14.2 Certificate life cycles
14.3 Certificate Distribution
14.4 PKI Audits
14.5 commercial ACs
14.6 CA Directives
14.7 CA hierarchies
14.8 CA Security
14.9 Certificate Mapping
Unit XV: Security plans
15.1 Design of security plans
15.2 Security requirements
15.3 Modification of the security plan
Questions and answers
Knowledge test
Quality questionnaire
Previous requirements
No prior technical requirements are necessary to take this course. However, basic computer skills and knowledge of environments related to Information Technology are recommended.
Other training modalities
If you are interested in taking this course in telepresence mode, please contact us: Email: info@nanforiberica.com , Telephone: +34 91 031 66 78, WhatsApp: +34 685 60 05 91