The Anti-Virus Workshop gives delegates a hands-on opportunity to experiment with viruses under supervision and in a controlled environment. The first day provides a comprehensive introduction to viruses and anti-virus warfare, while the second day provid ...
This course will focus on malicious software, or malware, such as computer viruses, worms, and Trojan horses. Malware techniques will be studied, along with countermeasures and so-called ``benevolent'' forms of malware. Legal and ethical issues will be co ...
This 5-day course is designed for IT professionals who want to learn the fundamentals of network security. The course offers practical training in areas such as TCP/IP for computer communications, types of attack, applied cryptography, multi-firewalls ...
Packet Analysis and Intrusion Detection 5 Day You'll learn how to properly read and interpret packets and packet headers including IP, TCP, ICMP, and UDP. You will learn how to distinguish between normal, abnormal, and malicious traffic. You will also c ...
The Intrusion Prevention training offered by InfoSec Institute covers all areas of intrusion prevention. Host Intrusion Prevention and Network Intrusion Prevention are covered in great detail. You will learn the technical details that make Intrusion Preve ...
In order to protect computer systems against hacker attacks, various firewalls are used today. Doubtlessly, firewalls increase IT security. However, firewalls cannot ward off all attacks. They are useless against attacks initiated from within the network ...
This course is for those IT professionals who want to master network security. In our course they will learn the best practices to safe-guard their network perimeter. We offer training on using Multi-Vendor firewall products such as Zone Alarm, Smoothwall ...
In this course, you gain extensive hands-on experience installing and configuring a firewall. You learn how to allow access to key services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private ne ...
After a detailed discussion of the TCP/IP suite component protocols and Ethernet operation, practice using various tools to capture, analyze, and generate Internet Protocol (IP) traffic. Then explore the tools and techniques used to exploit protocol we ...
This 5-day course is aimed at IT professionals who want to further their knowledge of establishing and maintaining secure networks. Students will learn the theory and best practices of protecting the network perimeter and put their knowledge into practice ...
This 3 day instructor led course is task orientated and teaches the skills needed to describe, configure, verify and manage the PIX Firewalls.
The CSSA Instructor-led Training is designed to reinforce the foundational knowledge in the SonicWALL Technical e*Training courses. These courses provide the hands-on experiential training that will enhance problem solving and provide dynamic feedback in ...
The Check Point Secure Platform Boot Camp is an intensive 5-day instructor-led course, which introduces the security administrator to Check Point's Secure Platform and Check Point NG. The course provides the information and experience necessary to deploy ...
Firewall Basics with WFS A three-day course that focuses on the design and implementation of a corporate security policy using the WatchGuard System Manager management software and the award-winning WFS appliance software. This course prepares you for th ...
The VPN Specialist is a combination of the Cisco Secure Virtual Private Networks (CSVPN) course and the Securing Cisco Network Devices (SND) course, both delivered together in one 5-day class. Because of the accelerated nature of the course, be prepared f ...
VPNs can provide significant business benefits by allowing remote users and multiple sites to communicate securely across shared networks, including the Internet. IPsec provides the technology to implement secure VPNs. You learn to apply the standards an ...
In this instructor-led, lab-intensive course, get the knowledge and skills needed to describe, configure, verify, and manage the Cisco Virtual Private Network (VPN) 3000 Concentrator, Cisco VPN Software Client, and Cisco VPN 3002 Hardware Client feature s ...
For Linux- and/or UNIX- systems administrators who want to build skills at configuring common network services and security administration using Red Hat Linux
Red Hat Enterprise Linux has gained considerable momentum as the operating system of choice for deploying network services such as web, ftp, email, and file sharing. RHS333 Red Hat Enterprise Security: Network Services is an intensive course that provides ...
This intermediate course is intended for administrators and support personnel who wish to learn the key skills required to implement security on Linux installations. As more servers on the network move to the Linux operating system, security becomes an in ...
© Computer Network Defence Limited 2022