________________________________________________________________
 Do you want to take this course remotely or in person?
 Contact us by email: info@nanforiberica.com , phone: +34 91 031 66 78, WhatsApp: +34 685 60 05 91 , or contact Our Offices
 ________________________________________________________________
           
      
    
      
      
      
          
          
          
          
  
    Course description. Network security
 This course is taught in online mode and consists of 15 units. The duration of the course is 4 0 hours That distributes between content and collaboration tools. Upon completion, the student will receive an accrediting diploma.
 Training is done through our Virtual Campus , with this modality you will have all the didactic content on the course platform and it will be accessible, from the start day of the course, 24 hours a day, every day of the week. The student will also have participation forums , as well as a continuous tutoring .
 The course is taught in teletraining modality (100% bonus option). In-person and remote training actions can also be carried out on demand.
 Course objectives
 Computer networks are constantly growing and are connecting to the Internet as a result of e-commerce, productivity and access to information. Therefore, this course wants to illustrate to students the possible risks they may suffer on the Internet. For this purpose, this course talks about everything that refers to Internet security: digital signatures, encryption, firewalls, security risks, basic connections with databases through ADO .NET and finally you will learn to create components.
 Addressed to
 System administrators and people who want to delve into security issues.
 
Course content
 Unit I: Security Risk Assessment
 1.1 Data
 1.2 Services
 1.3 Attacks
 1.4 Security certifications
 1.5 Network security
 Unit II: Windows 2000 Concepts
 2.1 Active Directory logical structures
 2.2 Trust relationships
 2.3 Manage using Group Policy
 2.4 Kerberos v5 authentication process
 2.5 Validation using certificates
 2.6 NTLM Validation
 2.7 Security SID
 2.8 Access to resources
 2.9 User group
 Unit III: Administration
 3.1 Administrative models
 3.2 Administrative tasks
 3.3 User groups
 3.4 Remote administration
 Unit IV: User Accounts
 4.1 Policy design
 4.2 Policy enforcement levels
 4.3 Effective application of policies
 4.4 User accounts
 4.5 Audits
 4.6 Audit plan
 Unit V: Windows 2000 computer security
 5.1 Physical network security
 5.2 Password security
 5.3 Security requirements
 5.4 Default security of W2K machines
 5.5 Compatibility of non-W2K certified applications 
5.6 Using incremental templates
 5.7 Template configuration
 5.8 New directives
 Unit VI: Resource Security
 6.1 File systems
 6.2 Use of the DACL
 6.3 Shared permissions
 6.4 NTFS permissions
 6.5 Printing Resources
 6.6 Registry Protection
 6.7 Data encryption
 6.8 Audit access to resources
 6.9 Backup Tasks
 Unit VII: Secure communication channels
 7.1 Communications risks
 7.2 Encryption of communication channels
 7.3 Security of application protocols
 7.4 Secure file transmissions
 7.5 Webcasts
 7.6 E-mail transmissions
 7.7 Using IPSec
 Unit VIII: Non-Microsoft Client Access
 8.1 UNIX
 8.2 UNIX client authentication
 8.3 Ensure access to files
 8.4 Interoperability with Novell
 8.5 Novell Client Authentication
 8.6 Secure access to Novell resources 
8.7 Interoperability with Macintosh
 8.8 Mac Client Authentication
 8.9 Risks of services in heterogeneous networks
 Unit IX: Remote Client Access
 9.1 Risks of RAS services
 9.2 RAS Authentication
 9.3 Authorize remote connections
 9.4 Remote access policies
 9.5 RAS Directive Model
 9.6 Support remote access from NT 4.0 servers
 9.7 Definition of call security
 9.8 Benefits of VPN connection
 9.9 Using RADIUS
 Unit X: Access to remote offices
 10.1 Public and private networks
 10.2 Router security
 10.3 Windows 2000 Routers
 10.4 Security requirements
 Unit XI: Internet user access
 11.1 Common attacks
 11.2 Denial of service attacks
 11.3 Port scanning
 11.4 Internal network protection
 11.5 Protocol filter through Firewall
 11.6 Customer entry from the Internet 
11.7 Firewall topologies, screened subnets
 11.8 Availability
 11.9 Sceened Internet Traffic Security
 Unit XII: User access to the Internet
 12.1 Internal network protection
 12.2 Internet access policies
 12.3 Planning firewalls (ISA Server)
 12.4 Internet access
 Unit XIII: Extension of the network to business partners
 13.1 Information exchanges
 13.2 Service security
 13.3 Remote partners
 13.4 Logical security organizations
 13.5 Authentication
 Unit XIV: PKI Design
 14.1 Key infrastructure
 14.2 Certificate life cycles
 14.3 Certificate Distribution
 14.4 PKI Audits
 14.5 commercial ACs
 14.6 CA Directives
 14.7 CA hierarchies
 14.8 CA Security
 14.9 Certificate Mapping
 Unit XV: Security plans
 15.1 Design of security plans 
15.2 Security requirements
 15.3 Modification of the security plan
 Questions and answers
 Knowledge test
 Quality questionnaire
 Previous requirements 
 No prior technical requirements are necessary to take this course. However, basic computer skills and knowledge of environments related to Information Technology are recommended.
 Other training modalities
 If you are interested in taking this course in telepresence mode, please contact us: Email: info@nanforiberica.com , Telephone: +34 91 031 66 78, WhatsApp: +34 685 60 05 91