Network security

| /


¿Quiere realizar este curso en modalidad telepresencial o presencial?

Póngase en contacto con nosotros por correo: info@nanforiberica.comteléfono: +34 91 031 66 78, WhatsApp: +34 685 60 05 91, o comunícate con Nuestras Oficinas


Course description. Network security

This course is taught in online mode and consists of 15 units. The duration of the course is 4 0 hours That distributes between content and collaboration tools. Upon completion, the student will receive an accrediting diploma.

Training is done through our Virtual Campus , with this modality you will have all the didactic content on the course platform and it will be accessible, from the start day of the course, 24 hours a day, every day of the week. The student will also have participation forums , as well as a continuous tutoring .

The course is taught in teletraining modality (100% bonus option). In-person and remote training actions can also be carried out on demand.

    Course objectives

    Computer networks are constantly growing and are connecting to the Internet as a result of e-commerce, productivity and access to information. Therefore, this course wants to illustrate to students the possible risks they may suffer on the Internet. For this purpose, this course talks about everything that refers to Internet security: digital signatures, encryption, firewalls, security risks, basic connections with databases through ADO .NET and finally you will learn to create components.

    Addressed to

    System administrators and people who want to delve into security issues.


    Course content

    Unit I: Security Risk Assessment

    1.1 Data
    1.2 Services
    1.3 Attacks
    1.4 Security certifications
    1.5 Network security

    Unit II: Windows 2000 Concepts

    2.1 Active Directory logical structures
    2.2 Trust relationships
    2.3 Manage using Group Policy
    2.4 Kerberos v5 authentication process
    2.5 Validation using certificates
    2.6 NTLM Validation
    2.7 Security SID
    2.8 Access to resources
    2.9 User group

    Unit III: Administration

    3.1 Administrative models
    3.2 Administrative tasks
    3.3 User groups
    3.4 Remote administration

    Unit IV: User Accounts

    4.1 Policy design
    4.2 Policy enforcement levels
    4.3 Effective application of policies
    4.4 User accounts
    4.5 Audits
    4.6 Audit plan

    Unit V: Windows 2000 computer security

    5.1 Physical network security
    5.2 Password security
    5.3 Security requirements
    5.4 Default security of W2K machines
    5.5 Compatibility of non-W2K certified applications

    5.6 Using incremental templates
    5.7 Template configuration
    5.8 New directives

    Unit VI: Resource Security

    6.1 File systems
    6.2 Use of the DACL
    6.3 Shared permissions
    6.4 NTFS permissions
    6.5 Printing Resources
    6.6 Registry Protection
    6.7 Data encryption
    6.8 Audit access to resources
    6.9 Backup Tasks

    Unit VII: Secure communication channels

    7.1 Communications risks
    7.2 Encryption of communication channels
    7.3 Security of application protocols
    7.4 Secure file transmissions
    7.5 Webcasts
    7.6 E-mail transmissions
    7.7 Using IPSec

    Unit VIII: Non-Microsoft Client Access

    8.1 UNIX
    8.2 UNIX client authentication
    8.3 Ensure access to files
    8.4 Interoperability with Novell
    8.5 Novell Client Authentication
    8.6 Secure access to Novell resources

    8.7 Interoperability with Macintosh
    8.8 Mac Client Authentication
    8.9 Risks of services in heterogeneous networks

    Unit IX: Remote Client Access

    9.1 Risks of RAS services
    9.2 RAS Authentication
    9.3 Authorize remote connections
    9.4 Remote access policies
    9.5 RAS Directive Model
    9.6 Support remote access from NT 4.0 servers
    9.7 Definition of call security
    9.8 Benefits of VPN connection
    9.9 Using RADIUS

    Unit X: Access to remote offices

    10.1 Public and private networks
    10.2 Router security
    10.3 Windows 2000 Routers
    10.4 Security requirements

    Unit XI: Internet user access

    11.1 Common attacks
    11.2 Denial of service attacks
    11.3 Port scanning
    11.4 Internal network protection
    11.5 Protocol filter through Firewall
    11.6 Customer entry from the Internet

    11.7 Firewall topologies, screened subnets
    11.8 Availability
    11.9 Sceened Internet Traffic Security

    Unit XII: User access to the Internet

    12.1 Internal network protection
    12.2 Internet access policies
    12.3 Planning firewalls (ISA Server)
    12.4 Internet access

    Unit XIII: Extension of the network to business partners

    13.1 Information exchanges
    13.2 Service security
    13.3 Remote partners
    13.4 Logical security organizations
    13.5 Authentication

    Unit XIV: PKI Design

    14.1 Key infrastructure
    14.2 Certificate life cycles
    14.3 Certificate Distribution
    14.4 PKI Audits
    14.5 commercial ACs
    14.6 CA Directives
    14.7 CA hierarchies
    14.8 CA Security
    14.9 Certificate Mapping

    Unit XV: Security plans

    15.1 Design of security plans
    15.2 Security requirements
    15.3 Modification of the security plan

    Questions and answers
    Knowledge test
    Quality questionnaire

    Previous requirements

    No prior technical requirements are necessary to take this course. However, basic computer skills and knowledge of environments related to Information Technology are recommended.

    Other training modalities

    If you are interested in taking this course in telepresence mode, please contact us: Email: , Telephone: +34 91 031 66 78, WhatsApp: +34 685 60 05 91

    Information related to training

    Soporte siempre a tu lado

    Training support: Always by your side

    Formación presencial y telepresencial

    Do you need another training modality?


    Bonuses for companies