This Defending the Perimeter from Cyber Attacks course will teach you to ensure the confidentiality, integrity, and availability of your organization’s information by protecting your communications and data.
What you'll learn
You will learn how to define and implement security principles, install and customize secure firewalls, build Virtual Private Network (VPN) tunnels, and safeguard your organization’s network perimeter against malicious attacks.
Basic security knowledge at the level of: course 468, System and Network Security Introduction
Working knowledge of TCP/IP and client server architecture
Pre-requisites
• None
Curriculum
Defining security principles
Developing a security policy
Installing a firewall
Configuring a firewall to support outgoing services
Providing external services securely
Allowing access to internal services
Deploying an IDS
Detecting intrusions in the enterprise
Interpreting alerts
Stopping intruders
Building VPN tunnels
Deploying client software
Applying cryptographic protection
Comparing tunneling and protection methods
Reducing the impact of denial-of-service (DoS) attacks