Course Curriculum
Network Defense Fundamentals: Training for IT Beginners | |||
Introduction | |||
The goals of Network defense | 00:05:00 | ||
The overview of the different types of network defense approaches | 00:05:00 | ||
The different types of Network security controls | 00:08:00 | ||
Basic Linux concepts | 00:03:00 | ||
Identification, authentication and authorization | |||
The different types of identifications (overview) | 00:02:00 | ||
The different types of authentications (overview) | 00:05:00 | ||
The different types of authorization (overview) | 00:03:00 | ||
Network security controls: physical controls | |||
Understanding the importance of physical security | 00:04:00 | ||
The different physical security attack vectors | 00:04:00 | ||
Understanding the various environmental controls | 00:04:00 | ||
Network security controls: technical controls | |||
Understanding Network segmentation and its types | 00:05:00 | ||
Understanding the different types of firewalls and their roles | 00:06:00 | ||
Understanding the different types of IDS/IPS and their roles | 00:05:00 | ||
The different types of proxy servers and their benefits | 00:04:00 | ||
Fundamentals of VPN and their importance in a network: Part 1 | 00:05:00 | ||
Fundamentals of VPN and their importance in a network: Part 2 | 00:05:00 | ||
Overview of antivirus/anti-malware software | 00:05:00 | ||
Virtualization and cloud computing | |||
Understanding virtualization and its components | 00:06:00 | ||
OS virtualization security | 00:06:00 | ||
Cloud computing and its benefits | 00:05:00 | ||
Overview of different types of cloud computing service | 00:05:00 | ||
Importance of cloud computing and its best practice | 00:06:00 | ||
Wireless network security | |||
Wireless network encryption mechanism | 00:05:00 | ||
Understanding the different types of wireless network authentication methods | 00:10:00 | ||
Wireless security measures and wireless security tools | 00:05:00 | ||
IoT device Security | |||
Understanding IoT architecture and communication models | 00:10:00 | ||
Understanding the best practice tool for IoT for security | 00:06:00 | ||
Cryptography and public key infrastructure | |||
Cryptography techniques | 00:06:00 | ||
The different Encryption algorithm | 00:06:00 | ||
The different hashing algorithm | 00:05:00 | ||
Different cryptography tools and hash calculators | 00:03:00 | ||
PKI infrastructure | 00:04:00 | ||
Data security | |||
The different data security controls for data encryption | 00:24:00 | ||
File encryption, removable-media encryption and disk encryption | 00:05:00 | ||
Methods and tools for data backup retention: Part 1 | 00:04:00 | ||
Methods and tools for data backup retention: Part 2 | 00:06:00 | ||
DLP&S (data loss prevention and solutions) | 00:04:00 | ||
Mini Projects | |||
Installation of snort and its libraries. (Both Linux and ubuntu) | 00:04:00 | ||
Configuration of snort for IDS/ IPS functionalities | 00:04:00 | ||
Time-zone configuration and swap files in firewall | 00:03:00 | ||
How to set-up a VPN | 00:02:00 | ||
Firewall configuration | 00:06:00 |
Review