fourth r computer training sydney melbourne central coast newcastle
Course Code: CT22-505

Mitigating threats
Core system maintenance
Virus and spyware management
Browser security
Social engineering threats

Symmetric cryptography
Public key cryptography

Authentication systems
Authentication systems

Messaging security
E-mail security
Messaging and peer-to-peer security

User and role based security
Security policies
Securing file and print resources

Public key infrastructure
Key management and life cycle
Setting up a certificate server
Web server security with PKI

Access security
Biometric systems
Physical access security
Peripheral and component security
Storage device security

Ports and protocols
TCP/IP review
Protocol-based attacks
Network security
Common network devices
Secure network topologies
Browser-related network security

Wireless security
Wi-Fi network security
Non-PC wireless devices

Remote access security
Remote access
Virtual private networks

Auditing, logging, and monitoring
System logging
Server monitoring

Vulnerability testing
Risk and vulnerability assessment

Organizational security
Organizational policies
Education and training
Disposal and destruction

Business continuity
Redundancy planning
Environmental controls
After completing this course, students will know how to:
  • Mitigate threats to network security through core system maintenance, implement virus and spyware management tools, secure Web browsers, and identify social engineering threats.
  • Identify cryptography concepts including algorithms, public keys, security certificates, and single- and dual-sided certificates.
  • Implement authentication systems such as one-, two-, and three-factor authentication, prevent password cracking, and use authentication such as Kerberos and CHAP.
  • Secure e-mail and messaging services.
  • Create security policies to secure file and print resources.
  • Install, enable, and configure public key infrastructure.
  • Install and configure security systems including biometric systems, physical access controls, as well as access to peripherals, computer components, and storage devices.
  • Assess vulnerability to security attacks against TCP/IP ports and protocols.
  • Configure intranet and extranet security zones and use virtualization to protect network security, as well as identify common threats against network devices.
  • Implement a secure wireless network.
  • Create a secure remote access network using RADIUS, TACACS, LDAP, and VPNs.
  • Use auditing, logging, and monitoring techniques to maintain a secure network.
  • Conduct security risks and vulnerability assessment using IPS, IDS, MBSA, and OVAL tools.
  • Establish organizational security through organizational policies, education and training, and the proper disposal and destruction of IT equipment.
  • Create a business continuity plan that prepares the organization to deal with security threats and natural disasters.
Contact The Fourth R
computer training computer training join
computer training discounts
Copyright © The Fourth R. All Rights Reserved.