Network Defense Fundamentals: Training for IT Beginners opens the door to an exciting realm of cybersecurity. This course provides you with essential knowledge and techniques to safeguard networks from modern-day threats. From understanding physical security measures to mastering complex encryption techniques, every aspect of network defense is covered. Network Defense Fundamentals: Training for IT Beginners is crafted for individuals eager to build a robust foundation in network security, addressing topics like firewalls, IoT device security, and virtualization. Through engaging, comprehensive insights, this course ensures you’re equipped to face evolving challenges in cybersecurity. Discover the critical principles and strategies that are fundamental for ensuring network security success in today’s digital landscape.
Learning Outcomes
After studying the course materials of the Network Defense Fundamentals: Training for IT Beginners there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99. Original Hard Copy certificates need to be ordered at an additional cost of £8.
This Network Defense Fundamentals: Training for IT Beginners does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Network Defense Fundamentals: Training for IT Beginners was made by professionals and it is compatible with all PC’s, Mac’s, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection.
Introduction | |||
The goals of Network defense | 00:05:00 | ||
The overview of the different types of network defense approaches | 00:05:00 | ||
The different types of Network security controls | 00:08:00 | ||
Basic Linux concepts | 00:03:00 | ||
Identification, authentication and authorization | |||
The different types of identifications (overview) | 00:02:00 | ||
The different types of authentications (overview) | 00:05:00 | ||
The different types of authorization (overview) | 00:03:00 | ||
Network security controls: physical controls | |||
Understanding the importance of physical security | 00:04:00 | ||
The different physical security attack vectors | 00:04:00 | ||
Understanding the various environmental controls | 00:04:00 | ||
Network security controls: technical controls | |||
Understanding Network segmentation and its types | 00:05:00 | ||
Understanding the different types of firewalls and their roles | 00:06:00 | ||
Understanding the different types of IDS/IPS and their roles | 00:05:00 | ||
The different types of proxy servers and their benefits | 00:04:00 | ||
Fundementals of VPN and their importance in a network: Part 1 | 00:05:00 | ||
Fundementals of VPN and their importance in a network: Part 2 | 00:05:00 | ||
Overview of antivirus/anti-malware software | 00:05:00 | ||
Virtualization and cloud computing | |||
Understanding virtualization and its components | 00:06:00 | ||
OS virtualization security | 00:06:00 | ||
Cloud computing and its benefits | 00:04:00 | ||
Overview of different types of cloud computing service | 00:05:00 | ||
Importance of cloud computing and its best practice | 00:05:00 | ||
Wireless network security | |||
Wireless network encryption mechanism | 00:05:00 | ||
Understanding the different types of wireless network authentication methods | 00:10:00 | ||
Wireless security measures and wireless security tools | 00:05:00 | ||
IoT device Security | |||
Understanding IoT architecture and communication models | 00:10:00 | ||
Understanding the best practice tool for IoT for security | 00:06:00 | ||
Cryptography and public key infrastructure | |||
Cryptography techniques | 00:06:00 | ||
The different Encryption algorithm | 00:06:00 | ||
The different hashing algorithm | 00:05:00 | ||
Different cryptography tools and hash calculators | 00:03:00 | ||
PKI infrastructure | 00:04:00 | ||
Data security | |||
The different data security controls for data encryption | 00:24:00 | ||
File encryption, removable-media encryption and disk encryption | 00:05:00 | ||
Methods and tools for data backup retention: Part 1 | 00:04:00 | ||
Methods and tools for data backup retention: Part 2 | 00:06:00 | ||
DLP&S (data loss prevention and solutions) | 00:04:00 | ||
Mini Projects | |||
The implementation of an IDS/IPS (Snort) on a Linux based system | 00:04:00 | ||
Installation of snort and its libraries. (Both Linux and ubuntu) | 00:04:00 | ||
Configuration of snort for IDS/ IPS functionalities | 00:04:00 | ||
Time-zone configuration and swap files in firewall | 00:03:00 | ||
How to set-up a VPN | 00:02:00 | ||
Firewall configuration | 00:06:00 |
Dive into the limitless potential of Excel with Mastering Excel 2016, the ultimate guide to harnessing this powerful software. From …
0
Master the art of professional document creation and elevate your productivity with Microsoft Word Advanced. This course empowers you to …
1
Step into the world of seamless data management with Microsoft Access for Beginners, your gateway to building, organizing, and analyzing …
0