In this Information Security Training course, you will gain the foundational knowledge and skills to analyze and assess network risks and then select and deploy appropriate countermeasures
Through multiple hands-on exercises, you will:
Module 1: Building a Secure Organization
Real threats that impact cybersecurity
A cyber security policy: the foundation of your protection
Module 2: A Cryptography Primer
Securing data with symmetric encryption
Solving key distribution issues with asymmetric encryption
Ensuring integrity with hashes
Module 3: Verifying User and Host Identity
Assessing traditional static password schemes
Evaluating strong authentication methods
Authenticating hosts
Module 4: Preventing System Intrusions
Discovering system vulnerabilities
Encrypting files for confidentiality
Hardening the operating system
Module 5: Guarding Against Network Intrusions
Scanning for vulnerabilities
Reducing Denial of Service (DoS) attacks
Deploying firewalls to control network traffic
Protecting web services and applications
Module 6: Ensuring Network Confidentiality
Threats from the LAN
Confidentiality on external connections