Network Operations Specialist Training (Network, Data, and Communications Security)
Rated 3.5/5 based on 11 customer reviews

Network Operations Specialist Training (Network, Data, and Communications Security)

Available: In Stock
$198.00

Image

Training Formats:      Instructor-Led, Self-Paced

Duration:        5 Days

Course Overview

Having a solid defense-in-depth strategy for architecting and operating networked technology provides organizations with operational resilience from cyber-attacks and data breaches. Students will learn key concepts about security architecture, network segmentation, defense in-depth, encryption technologies, and backup/replication sites, including cloud-based servers and services.

Activities/Labs:

 

  • Lab Environment Orientation
  • Creating Recommendations Based on Vulnerability Assessments
  • Sensitive Information Identification
  • Post Incident Service Restoration
  • Securing Linux for System Administrators
  • Cybersecurity Testing with Core Impact
  • Identify Whether High-Risk Systems Were Affected
  • Assess A High-Risk System
  • Vulnerability Identification and Remediation
  • Vulnerability Scan Analysis
  • Creation of Standard Operating Procedures for Recovery
  • Implement Single System Changes in Firewall
  • Secure Software Developer - Python Code Review
  • Identifying Malicious Network Connections
  • Identifying Intrusion and Mitigating Attacks with RHEL Server Capstone
  • Securing Linux - Firewalls
  • Setting Up Zones in a Firewall
  • Tweaking Firewall Rules for Detection
  • Rogue Device Identification and Blocking
  • Network Segmentation (FW/DMZ/WAN/LAN)
  • Auditing Service Accounts and Setting up Automated Log Collection
  • Firewall Setup and Configuration
  • Detect the Introduction of a Malicious Application
  • LNX101 - Setting Up a Firewall with UFW and Firewalled
  • IDS Setup and Configuration
  • Introduction to OWASP Top Ten: Capstone
  • Gap Analysis of Firewall Rules
  • Identify Access to a LINUX Firewall through SYSLOG Service
  • System Administrator Capstone (Auditing and Log Collection)
  • Baseline Systems in Accordance with Policy Documentation
  • Core Impact Web Application Penetration Testing
  • System Hardening
  • Windows System Hardening
  • Report Writing for Presentation to Management
  • Analysis and Recommendation Report
  • Log Correlation & Analysis to Identify Potential IOC
  • LNX101 - OpenSSH Installation, Configuration, and Hardening

Training Formats:      Instructor-Led, Self-Paced

Duration:        5 Days

Course Overview

Having a solid defense-in-depth strategy for architecting and operating networked technology provides organizations with operational resilience from cyber-attacks and data breaches. Students will learn key concepts about security architecture, network segmentation, defense in-depth, encryption technologies, and backup/replication sites, including cloud-based servers and services.

Activities/Labs:

 

  • Lab Environment Orientation
  • Creating Recommendations Based on Vulnerability Assessments
  • Sensitive Information Identification
  • Post Incident Service Restoration
  • Securing Linux for System Administrators
  • Cybersecurity Testing with Core Impact
  • Identify Whether High-Risk Systems Were Affected
  • Assess A High-Risk System
  • Vulnerability Identification and Remediation
  • Vulnerability Scan Analysis
  • Creation of Standard Operating Procedures for Recovery
  • Implement Single System Changes in Firewall
  • Secure Software Developer - Python Code Review
  • Identifying Malicious Network Connections
  • Identifying Intrusion and Mitigating Attacks with RHEL Server Capstone
  • Securing Linux - Firewalls
  • Setting Up Zones in a Firewall
  • Tweaking Firewall Rules for Detection
  • Rogue Device Identification and Blocking
  • Network Segmentation (FW/DMZ/WAN/LAN)
  • Auditing Service Accounts and Setting up Automated Log Collection
  • Firewall Setup and Configuration
  • Detect the Introduction of a Malicious Application
  • LNX101 - Setting Up a Firewall with UFW and Firewalled
  • IDS Setup and Configuration
  • Introduction to OWASP Top Ten: Capstone
  • Gap Analysis of Firewall Rules
  • Identify Access to a LINUX Firewall through SYSLOG Service
  • System Administrator Capstone (Auditing and Log Collection)
  • Baseline Systems in Accordance with Policy Documentation
  • Core Impact Web Application Penetration Testing
  • System Hardening
  • Windows System Hardening
  • Report Writing for Presentation to Management
  • Analysis and Recommendation Report
  • Log Correlation & Analysis to Identify Potential IOC
  • LNX101 - OpenSSH Installation, Configuration, and Hardening