SlideShare a Scribd company logo
1 of 3
Download to read offline
Information Security Training
Course 468
Duration:4 days
Language:English
Level:Foundation
Labs:Yes
23 CompTIACEUs
23 NASBACPECredits
Inthis InformationSecurity Training course, youwillgainthe foundationalknowledge and skills to analyze and assess network risks and then
select and deployappropriate countermeasures.
InformationSecurity Training Delivery Methods
In-Person
Online
InformationSecurity Training Information
Throughmultiple hands-onexercises, youwill:
Evaluate methods for strongauthentication.
Searchfor possible vulnerabilities inoperatingsystems.
Reduce your organization’s exposure to dangers inenterprise-wide and virtualprivate networks (VPNs).
Analyze your exposure to securitythreats.
Protect your organization's systems and data.
Deployfirewalls and data encryptionto minimize threats.
Assess alternative user and host authenticationmechanisms.
Manage risks originatingfrominside the organizationand fromthe internet.
Leverage continued support withafter-course one-on-one instructor coachingand computingsandbox.
Prerequisites
None.
InformationSecurity Training Outline
Module 1: Building ASecure Organization
Realthreats that impact cybersecurity
Hackers, internaland external
Eavesdropping
Spoofing
Sniffing
Trojanhorses
Viruses
Wiretaps
Acyber securitypolicy:the foundationofyour protection
Definingyour informationassurance objectives
Assessingyour exposure
Module 2: ACryptography Primer
Securingdata withsymmetric encryption
Choosingyour algorithm:DES, AES, Rc4, and others
Assessingkeylengthand keydistribution
Solvingkeydistributionissues withasymmetric encryption
Generatingkeys
EncryptingwithRSA
Explore PGP and GnuPG
EvaluatingWeb ofTrust and PKI
Ensuringintegritywithhashes
HashingwithMd5 and SHA
Protectingdata intransit
Buildingthe digitalsignature
Module 3: Verifying UserandHost Identity
Assessingtraditionalstatic password schemes
Creatinga strongpassword policyto prevent password guessingand cracking
Protectingagainst socialengineeringattacks
Encryptingpasswords to mitigate the impact ofpassword sniffing
Evaluatingstrongauthenticationmethods
Preventingpassword replayusingone-time and tokenized passwords
Employingbiometrics as part ofmulti-factor authentication
Authenticatinghosts
DistrustingIP (Internet Protocol) addresses
Mitigatingaddress-spoofingissues and implementingcountermeasures
Implementingsolutions for wireless networks
Module 4: Preventing SystemIntrusions
Discoveringsystemvulnerabilities
Searchingfor operatingsystemvulnerabilities
Discoveringfile permissionissues
Limitingaccess via physicalsecurity
Encryptingfiles for confidentiality
Encryptingwithapplication-specific tools
Recoveringencrypted data
Hardeningthe operatingsystem
Lockingdownuser accounts
Securingadministrator's permissions
Protectingagainst viruses
Module 5: Guarding Against Network Intrusions
Scanningfor vulnerabilities
Searchingfor rogue servers
Profilingsystems and services
ReducingDenialofService (DoS) attacks
SecuringDNS (DomainName System)
Limitingthe impact ofcommonattacks
Deployingfirewalls to controlnetwork traffic
Preventingintrusions withfilters
Implementinga cyber securitypolicy
Deployingpersonalfirewalls
Protectingweb services and applications
Validatinguser input
Controllinginformationleakage
Module 6: Ensuring Network Confidentiality
Threats fromthe LAN
Sniffingthe network
Mitigatingthreats fromconnected hosts
Partitioningthe network to prevent data leakage
Identifyingwireless LAN vulnerabilities
Confidentialityonexternalconnections
Ensuringconfidentialitywithencryption
SecuringcommunicationwithIPsec

More Related Content

Similar to information-security-training.pdf

Similar to information-security-training.pdf (20)

EC-Council Certified Network Defender
EC-Council Certified Network DefenderEC-Council Certified Network Defender
EC-Council Certified Network Defender
 
mille2.pptx
mille2.pptxmille2.pptx
mille2.pptx
 
Free Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdfFree Guide to Master in Ethical Hacking (CEH v12).pdf
Free Guide to Master in Ethical Hacking (CEH v12).pdf
 
𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇
𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇
𝐘𝐨𝐮𝐫 𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠 👇
 
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠
𝐅𝐑𝐄𝐄 𝐆𝐮𝐢𝐝𝐞 𝐓𝐨 𝐌𝐚𝐬𝐭𝐞𝐫 𝐄𝐭𝐡𝐢𝐜𝐚𝐥 𝐇𝐚𝐜𝐤𝐢𝐧𝐠
 
CEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdfCEH v12 Certification Training Guide.pdf
CEH v12 Certification Training Guide.pdf
 
The Ultimate Guide to Ethical Hacking Careers with C|EH
The Ultimate Guide to Ethical Hacking Careers with C|EHThe Ultimate Guide to Ethical Hacking Careers with C|EH
The Ultimate Guide to Ethical Hacking Careers with C|EH
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
 
Defensive Cybersecurity: A Modern Approach to Safeguarding Digital Assets
Defensive Cybersecurity: A Modern Approach to Safeguarding Digital AssetsDefensive Cybersecurity: A Modern Approach to Safeguarding Digital Assets
Defensive Cybersecurity: A Modern Approach to Safeguarding Digital Assets
 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security Certifications
 
A Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber RangeA Fresh, New Look for CMD+CTRL Cyber Range
A Fresh, New Look for CMD+CTRL Cyber Range
 
Presentation1 A.pptx
Presentation1 A.pptxPresentation1 A.pptx
Presentation1 A.pptx
 
Cybersecurity.pdf
Cybersecurity.pdfCybersecurity.pdf
Cybersecurity.pdf
 
Cyber Safety Awareness Training (Brochure)
Cyber Safety Awareness Training (Brochure)Cyber Safety Awareness Training (Brochure)
Cyber Safety Awareness Training (Brochure)
 
EC-Council Certified SOC Analyst
EC-Council Certified SOC AnalystEC-Council Certified SOC Analyst
EC-Council Certified SOC Analyst
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
 

More from ssuser2209e8

More from ssuser2209e8 (17)

How to win friends and influence people Arabic.pdf
How to win friends and influence people Arabic.pdfHow to win friends and influence people Arabic.pdf
How to win friends and influence people Arabic.pdf
 
1 minute communication.pdf
1 minute communication.pdf1 minute communication.pdf
1 minute communication.pdf
 
RH-ISAC_BuildingtheFoundation_WhitePaper.pdf
RH-ISAC_BuildingtheFoundation_WhitePaper.pdfRH-ISAC_BuildingtheFoundation_WhitePaper.pdf
RH-ISAC_BuildingtheFoundation_WhitePaper.pdf
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
DRAFT CYBER SECURITY PLAN Dec 5 2015.pdf
DRAFT CYBER SECURITY PLAN  Dec 5 2015.pdfDRAFT CYBER SECURITY PLAN  Dec 5 2015.pdf
DRAFT CYBER SECURITY PLAN Dec 5 2015.pdf
 
info sys risk management.pdf
info sys risk management.pdfinfo sys risk management.pdf
info sys risk management.pdf
 
11869841.ppt
11869841.ppt11869841.ppt
11869841.ppt
 
Theories behind Gamification of Learning and Instruction.pptx
Theories behind Gamification of Learning and Instruction.pptxTheories behind Gamification of Learning and Instruction.pptx
Theories behind Gamification of Learning and Instruction.pptx
 
slide 24.pdf
slide 24.pdfslide 24.pdf
slide 24.pdf
 
slide 13.pdf
slide 13.pdfslide 13.pdf
slide 13.pdf
 
slide 10.pdf
slide 10.pdfslide 10.pdf
slide 10.pdf
 
slide 5.pdf
slide 5.pdfslide 5.pdf
slide 5.pdf
 
How to design a leadership program.pdf
How to design a leadership program.pdfHow to design a leadership program.pdf
How to design a leadership program.pdf
 
اسس الادارة الصفية.ppt
اسس الادارة الصفية.pptاسس الادارة الصفية.ppt
اسس الادارة الصفية.ppt
 
الاتصال والتواصل.PPT
الاتصال والتواصل.PPTالاتصال والتواصل.PPT
الاتصال والتواصل.PPT
 
Training Manual (1).docx
Training Manual (1).docxTraining Manual (1).docx
Training Manual (1).docx
 
ادارة الوقت بفاعلية.ppt
ادارة الوقت بفاعلية.pptادارة الوقت بفاعلية.ppt
ادارة الوقت بفاعلية.ppt
 

Recently uploaded

Karachi Sexy Girls || 03280288848 || Sex services in Karachi
Karachi Sexy Girls || 03280288848 || Sex services in KarachiKarachi Sexy Girls || 03280288848 || Sex services in Karachi
Karachi Sexy Girls || 03280288848 || Sex services in Karachi
Awais Yousaf
 
Call Girls in Sialkot || 🥵👙 || 03280288848
Call Girls in Sialkot || 🥵👙 || 03280288848Call Girls in Sialkot || 🥵👙 || 03280288848
Call Girls in Sialkot || 🥵👙 || 03280288848
Ifra Zohaib
 
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Sana Rajpoot
 
Call Girls in Pakistan || 🥵 03280288848 || Pakistan Escorts
Call Girls in Pakistan || 🥵 03280288848 || Pakistan EscortsCall Girls in Pakistan || 🥵 03280288848 || Pakistan Escorts
Call Girls in Pakistan || 🥵 03280288848 || Pakistan Escorts
Ifra Zohaib
 
Call Girls In Saidpur Islamabad-->>03274100048 <<--
Call Girls In Saidpur Islamabad-->>03274100048 <<--Call Girls In Saidpur Islamabad-->>03274100048 <<--
Call Girls In Saidpur Islamabad-->>03274100048 <<--
Ifra Zohaib
 
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Sana Rajpoot
 

Recently uploaded (20)

MUZAFFARNAGAR CALL GIRL 9262871154 CALL GIRL MUZAFFARNAGAR ESCORT SERVICE PRO...
MUZAFFARNAGAR CALL GIRL 9262871154 CALL GIRL MUZAFFARNAGAR ESCORT SERVICE PRO...MUZAFFARNAGAR CALL GIRL 9262871154 CALL GIRL MUZAFFARNAGAR ESCORT SERVICE PRO...
MUZAFFARNAGAR CALL GIRL 9262871154 CALL GIRL MUZAFFARNAGAR ESCORT SERVICE PRO...
 
Karachi Sexy Girls || 03280288848 || Sex services in Karachi
Karachi Sexy Girls || 03280288848 || Sex services in KarachiKarachi Sexy Girls || 03280288848 || Sex services in Karachi
Karachi Sexy Girls || 03280288848 || Sex services in Karachi
 
Lucknow ❣️ Call Girl 97487*63073 Call Girls in Lucknow Escort service book now
Lucknow ❣️  Call Girl 97487*63073 Call Girls in Lucknow Escort service book nowLucknow ❣️  Call Girl 97487*63073 Call Girls in Lucknow Escort service book now
Lucknow ❣️ Call Girl 97487*63073 Call Girls in Lucknow Escort service book now
 
Kanpur 💋 Call Girls 7870993772 Call Girls in Kanpur Escort service book now
Kanpur 💋 Call Girls 7870993772 Call Girls in Kanpur Escort service book nowKanpur 💋 Call Girls 7870993772 Call Girls in Kanpur Escort service book now
Kanpur 💋 Call Girls 7870993772 Call Girls in Kanpur Escort service book now
 
Mysore 💋 Call Girl 9748763073 Call Girls in Mysore Escort service book now
Mysore 💋 Call Girl 9748763073 Call Girls in Mysore Escort service book nowMysore 💋 Call Girl 9748763073 Call Girls in Mysore Escort service book now
Mysore 💋 Call Girl 9748763073 Call Girls in Mysore Escort service book now
 
Digha Call Girl Service 97487*63073 Call Girls in Digha Escort service book...
Digha  Call Girl Service 97487*63073 Call Girls in Digha  Escort service book...Digha  Call Girl Service 97487*63073 Call Girls in Digha  Escort service book...
Digha Call Girl Service 97487*63073 Call Girls in Digha Escort service book...
 
Patna ❣️ Call Girl 7870993772 Call Girls in Patna Escort service book now
Patna ❣️ Call Girl 7870993772 Call Girls in Patna Escort service book nowPatna ❣️ Call Girl 7870993772 Call Girls in Patna Escort service book now
Patna ❣️ Call Girl 7870993772 Call Girls in Patna Escort service book now
 
Hire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls Agency
Hire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls AgencyHire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls Agency
Hire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls Agency
 
Pune ❤CALL GIRL 9874883814 ❤CALL GIRLS IN pune ESCORT SERVICE❤CALL GIRL IN We...
Pune ❤CALL GIRL 9874883814 ❤CALL GIRLS IN pune ESCORT SERVICE❤CALL GIRL IN We...Pune ❤CALL GIRL 9874883814 ❤CALL GIRLS IN pune ESCORT SERVICE❤CALL GIRL IN We...
Pune ❤CALL GIRL 9874883814 ❤CALL GIRLS IN pune ESCORT SERVICE❤CALL GIRL IN We...
 
Call Girls in Sialkot || 🥵👙 || 03280288848
Call Girls in Sialkot || 🥵👙 || 03280288848Call Girls in Sialkot || 🥵👙 || 03280288848
Call Girls in Sialkot || 🥵👙 || 03280288848
 
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
 
Call Girls in Pakistan || 🥵 03280288848 || Pakistan Escorts
Call Girls in Pakistan || 🥵 03280288848 || Pakistan EscortsCall Girls in Pakistan || 🥵 03280288848 || Pakistan Escorts
Call Girls in Pakistan || 🥵 03280288848 || Pakistan Escorts
 
Rajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
Rajkot Call Girls Contact Number +919358341802 Call Girls In RajkotRajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
Rajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
 
NAGPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
NAGPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICENAGPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
NAGPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
Varanasi Call Girl 78709*93772 Call Girls in Varanasi Escort service book now
Varanasi  Call Girl 78709*93772 Call Girls in Varanasi Escort service book nowVaranasi  Call Girl 78709*93772 Call Girls in Varanasi Escort service book now
Varanasi Call Girl 78709*93772 Call Girls in Varanasi Escort service book now
 
Call Girls In Saidpur Islamabad-->>03274100048 <<--
Call Girls In Saidpur Islamabad-->>03274100048 <<--Call Girls In Saidpur Islamabad-->>03274100048 <<--
Call Girls In Saidpur Islamabad-->>03274100048 <<--
 
Hyderabad ❣️ Call Girl 9748763073 Call Girls in Hyderabad Escort service boo...
Hyderabad ❣️  Call Girl 9748763073 Call Girls in Hyderabad Escort service boo...Hyderabad ❣️  Call Girl 9748763073 Call Girls in Hyderabad Escort service boo...
Hyderabad ❣️ Call Girl 9748763073 Call Girls in Hyderabad Escort service boo...
 
BARASAT CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
BARASAT CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICEBARASAT CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
BARASAT CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
Hyderabad ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Hyderabad ESCORT SERVICE❤CALL ...
Hyderabad ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Hyderabad ESCORT SERVICE❤CALL ...Hyderabad ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Hyderabad ESCORT SERVICE❤CALL ...
Hyderabad ❤CALL GIRL 9874883814 ❤CALL GIRLS IN Hyderabad ESCORT SERVICE❤CALL ...
 
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
Call Girls In Lahore || 03274100048 ||Lahore Call Girl Available 24/7
 

information-security-training.pdf

  • 1. Information Security Training Course 468 Duration:4 days Language:English Level:Foundation Labs:Yes 23 CompTIACEUs 23 NASBACPECredits Inthis InformationSecurity Training course, youwillgainthe foundationalknowledge and skills to analyze and assess network risks and then select and deployappropriate countermeasures. InformationSecurity Training Delivery Methods In-Person Online InformationSecurity Training Information Throughmultiple hands-onexercises, youwill: Evaluate methods for strongauthentication. Searchfor possible vulnerabilities inoperatingsystems. Reduce your organization’s exposure to dangers inenterprise-wide and virtualprivate networks (VPNs). Analyze your exposure to securitythreats. Protect your organization's systems and data. Deployfirewalls and data encryptionto minimize threats. Assess alternative user and host authenticationmechanisms. Manage risks originatingfrominside the organizationand fromthe internet. Leverage continued support withafter-course one-on-one instructor coachingand computingsandbox. Prerequisites None. InformationSecurity Training Outline Module 1: Building ASecure Organization Realthreats that impact cybersecurity Hackers, internaland external Eavesdropping Spoofing Sniffing Trojanhorses Viruses Wiretaps Acyber securitypolicy:the foundationofyour protection Definingyour informationassurance objectives Assessingyour exposure Module 2: ACryptography Primer
  • 2. Securingdata withsymmetric encryption Choosingyour algorithm:DES, AES, Rc4, and others Assessingkeylengthand keydistribution Solvingkeydistributionissues withasymmetric encryption Generatingkeys EncryptingwithRSA Explore PGP and GnuPG EvaluatingWeb ofTrust and PKI Ensuringintegritywithhashes HashingwithMd5 and SHA Protectingdata intransit Buildingthe digitalsignature Module 3: Verifying UserandHost Identity Assessingtraditionalstatic password schemes Creatinga strongpassword policyto prevent password guessingand cracking Protectingagainst socialengineeringattacks Encryptingpasswords to mitigate the impact ofpassword sniffing Evaluatingstrongauthenticationmethods Preventingpassword replayusingone-time and tokenized passwords Employingbiometrics as part ofmulti-factor authentication Authenticatinghosts DistrustingIP (Internet Protocol) addresses Mitigatingaddress-spoofingissues and implementingcountermeasures Implementingsolutions for wireless networks Module 4: Preventing SystemIntrusions Discoveringsystemvulnerabilities Searchingfor operatingsystemvulnerabilities Discoveringfile permissionissues Limitingaccess via physicalsecurity Encryptingfiles for confidentiality Encryptingwithapplication-specific tools Recoveringencrypted data Hardeningthe operatingsystem Lockingdownuser accounts Securingadministrator's permissions Protectingagainst viruses Module 5: Guarding Against Network Intrusions Scanningfor vulnerabilities Searchingfor rogue servers Profilingsystems and services ReducingDenialofService (DoS) attacks
  • 3. SecuringDNS (DomainName System) Limitingthe impact ofcommonattacks Deployingfirewalls to controlnetwork traffic Preventingintrusions withfilters Implementinga cyber securitypolicy Deployingpersonalfirewalls Protectingweb services and applications Validatinguser input Controllinginformationleakage Module 6: Ensuring Network Confidentiality Threats fromthe LAN Sniffingthe network Mitigatingthreats fromconnected hosts Partitioningthe network to prevent data leakage Identifyingwireless LAN vulnerabilities Confidentialityonexternalconnections Ensuringconfidentialitywithencryption SecuringcommunicationwithIPsec