Comprehensive Security Course (CSC)

Security for Server, Networking Devices & Security Concepts

Ratings: 0.00 / 5.00




Description


Introduction to the Course

- "Through this course, we will give you a comprehensive introduction to Network Security. Indeed, we will explain the technical concepts; the level will therefore be accessible to everyone. If you already have computer prerequisites, this will undoubtedly be useful, but it is not mandatory."

Starting with the Basics

- "In the first learning section, we will speak on the security professional, threats to cyber security, types of security attacks, and physical security."

Mitigation Techniques

"Next, we will discuss several topics on how we can mitigate attacks through the use of ACLs, VACLs, and also a variation of Named ACLs as well as look into securing WLAN networks."

Dive into Microsoft Server and Active Directory

- "Through the final section, we will briefly look into the Microsoft server, specifically the active directory to centralize the login, and security for all user accounts and end devices."

- "Understanding active directories when working in a Microsoft environment is crucial to the company. Within an active directory not only can you harden user accounts through the use of GPOs and file sharing permissions, but also an array of many other security enhancements that AD provides, such as CAs, group permissions, and creating least privileged policies."

Conclusion and Key Takeaways

- "In conclusion, this course will give you a lot of technical and conceptual information for you to be able to secure a network with at least the minimum guidelines. When it comes to security, you must use a layered approach and add some sort of security from top to bottom."

What You Will Learn!

  • They will learn the basics of how networks are structured, common vulnerabilities and the principles of securing a network
  • They will learn about different types of networking devices and how to properly secure them.
  • They will learn the importance of firewalls in a perimeter network
  • They will learn how to configure ACL at different layers of your Network.

Who Should Attend!

  • This course is for individuals looking to enter network or security engineering positions.