Network Operations Specialist Training (Network, Data, and Communications Security)
Training Formats: Instructor-Led, Self-Paced
Duration: 5 Days
Course Overview
Having a solid defense-in-depth strategy for architecting and operating networked technology provides organizations with operational resilience from cyber-attacks and data breaches. Students will learn key concepts about security architecture, network segmentation, defense in-depth, encryption technologies, and backup/replication sites, including cloud-based servers and services.
Activities/Labs:
- Lab Environment Orientation
- Creating Recommendations Based on Vulnerability Assessments
- Sensitive Information Identification
- Post Incident Service Restoration
- Securing Linux for System Administrators
- Cybersecurity Testing with Core Impact
- Identify Whether High-Risk Systems Were Affected
- Assess A High-Risk System
- Vulnerability Identification and Remediation
- Vulnerability Scan Analysis
- Creation of Standard Operating Procedures for Recovery
- Implement Single System Changes in Firewall
- Secure Software Developer - Python Code Review
- Identifying Malicious Network Connections
- Identifying Intrusion and Mitigating Attacks with RHEL Server Capstone
- Securing Linux - Firewalls
- Setting Up Zones in a Firewall
- Tweaking Firewall Rules for Detection
- Rogue Device Identification and Blocking
- Network Segmentation (FW/DMZ/WAN/LAN)
- Auditing Service Accounts and Setting up Automated Log Collection
- Firewall Setup and Configuration
- Detect the Introduction of a Malicious Application
- LNX101 - Setting Up a Firewall with UFW and Firewalled
- IDS Setup and Configuration
- Introduction to OWASP Top Ten: Capstone
- Gap Analysis of Firewall Rules
- Identify Access to a LINUX Firewall through SYSLOG Service
- System Administrator Capstone (Auditing and Log Collection)
- Baseline Systems in Accordance with Policy Documentation
- Core Impact Web Application Penetration Testing
- System Hardening
- Windows System Hardening
- Report Writing for Presentation to Management
- Analysis and Recommendation Report
- Log Correlation & Analysis to Identify Potential IOC
- LNX101 - OpenSSH Installation, Configuration, and Hardening
Training Formats: Instructor-Led, Self-Paced
Duration: 5 Days
Course Overview
Having a solid defense-in-depth strategy for architecting and operating networked technology provides organizations with operational resilience from cyber-attacks and data breaches. Students will learn key concepts about security architecture, network segmentation, defense in-depth, encryption technologies, and backup/replication sites, including cloud-based servers and services.
Activities/Labs:
- Lab Environment Orientation
- Creating Recommendations Based on Vulnerability Assessments
- Sensitive Information Identification
- Post Incident Service Restoration
- Securing Linux for System Administrators
- Cybersecurity Testing with Core Impact
- Identify Whether High-Risk Systems Were Affected
- Assess A High-Risk System
- Vulnerability Identification and Remediation
- Vulnerability Scan Analysis
- Creation of Standard Operating Procedures for Recovery
- Implement Single System Changes in Firewall
- Secure Software Developer - Python Code Review
- Identifying Malicious Network Connections
- Identifying Intrusion and Mitigating Attacks with RHEL Server Capstone
- Securing Linux - Firewalls
- Setting Up Zones in a Firewall
- Tweaking Firewall Rules for Detection
- Rogue Device Identification and Blocking
- Network Segmentation (FW/DMZ/WAN/LAN)
- Auditing Service Accounts and Setting up Automated Log Collection
- Firewall Setup and Configuration
- Detect the Introduction of a Malicious Application
- LNX101 - Setting Up a Firewall with UFW and Firewalled
- IDS Setup and Configuration
- Introduction to OWASP Top Ten: Capstone
- Gap Analysis of Firewall Rules
- Identify Access to a LINUX Firewall through SYSLOG Service
- System Administrator Capstone (Auditing and Log Collection)
- Baseline Systems in Accordance with Policy Documentation
- Core Impact Web Application Penetration Testing
- System Hardening
- Windows System Hardening
- Report Writing for Presentation to Management
- Analysis and Recommendation Report
- Log Correlation & Analysis to Identify Potential IOC
- LNX101 - OpenSSH Installation, Configuration, and Hardening