• LOGIN
  • No products in the cart.

Overview

Network Defense Fundamentals: Training for IT Beginners Course is yet another “Teacher’s Choice” course from Teachers Training for a complete understanding of the fundamental topics. You are also entitled to exclusive tutor support and a professional CPD-accredited certificate in addition to the special discounted price for a limited time. Just like all our courses, this Network Defense Fundamentals: Training for IT Beginners Course and its curriculum have also been designed by expert teachers so that teachers of tomorrow can learn from the best and equip themselves with all the necessary skills.

Consisting of several modules, the course teaches you everything you need to succeed in this profession.

The course can be studied part-time. You can become accredited within 05 Hours studying at your own pace. Your qualification will be recognised and can be checked for validity on our dedicated website.

Why Choose Teachers Training

Some of our website features are:

Entry Requirements

No formal entry requirements. You need to have:

Certification

CPD Certification from The Teachers Training

Successfully completing the MCQ exam of this course qualifies you for a CPD-accredited certificate from The Teachers Training. You will be eligible for both PDF copy and hard copy of the certificate to showcase your achievement however you wish.

  • You can get your digital certificate (PDF) for £4.99 only
  • Hard copy certificates are also available, and you can get one for only £10.99
  • You can get both PDF and Hard copy certificates for just £12.99!

The certificate will add significant weight to your CV and will give you a competitive advantage when applying for jobs.

Course Curriculum

Network Defense Fundamentals: Training for IT Beginners
Introduction
The goals of Network defense 00:05:00
The overview of the different types of network defense approaches 00:05:00
The different types of Network security controls 00:08:00
Basic Linux concepts 00:03:00
Identification, authentication and authorization
The different types of identifications (overview) 00:02:00
The different types of authentications (overview) 00:05:00
The different types of authorization (overview) 00:03:00
Network security controls: physical controls
Understanding the importance of physical security 00:04:00
The different physical security attack vectors 00:04:00
Understanding the various environmental controls 00:04:00
Network security controls: technical controls
Understanding Network segmentation and its types 00:05:00
Understanding the different types of firewalls and their roles 00:06:00
Understanding the different types of IDS/IPS and their roles 00:05:00
The different types of proxy servers and their benefits 00:04:00
Fundamentals of VPN and their importance in a network: Part 1 00:05:00
Fundamentals of VPN and their importance in a network: Part 2 00:05:00
Overview of antivirus/anti-malware software 00:05:00
Virtualization and cloud computing
Understanding virtualization and its components 00:06:00
OS virtualization security 00:06:00
Cloud computing and its benefits 00:05:00
Overview of different types of cloud computing service 00:05:00
Importance of cloud computing and its best practice 00:06:00
Wireless network security
Wireless network encryption mechanism 00:05:00
Understanding the different types of wireless network authentication methods 00:10:00
Wireless security measures and wireless security tools 00:05:00
IoT device Security
Understanding IoT architecture and communication models 00:10:00
Understanding the best practice tool for IoT for security 00:06:00
Cryptography and public key infrastructure
Cryptography techniques 00:06:00
The different Encryption algorithm 00:06:00
The different hashing algorithm 00:05:00
Different cryptography tools and hash calculators 00:03:00
PKI infrastructure 00:04:00
Data security
The different data security controls for data encryption 00:24:00
File encryption, removable-media encryption and disk encryption 00:05:00
Methods and tools for data backup retention: Part 1 00:04:00
Methods and tools for data backup retention: Part 2 00:06:00
DLP&S (data loss prevention and solutions) 00:04:00
Mini Projects
Installation of snort and its libraries. (Both Linux and ubuntu) 00:04:00
Configuration of snort for IDS/ IPS functionalities 00:04:00
Time-zone configuration and swap files in firewall 00:03:00
How to set-up a VPN 00:02:00
Firewall configuration 00:06:00
Review

COURSE REVIEWS

0
    0
    Your Cart
    Your cart is empty

    ALL COURSES for £49 / year

    ADD OFFER TO CART

    No more than 50 active courses at any one time. Membership renews after 12 months. Cancel anytime from your account. Certain courses are not included. Can't be used in conjunction with any other offer.

      Apply Coupon