Practical Network Security

  Become a true Network Professional & get audits done like an expert with our interactive Network Security Course.

(NETWORK-SEC.AW1) / ISBN : 978-1-64459-634-0
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

About This Course

From learning about the security infrastructure to training, get your hands deep into the world of security with our Practical Network Security Course.

Prepare for security assessments with practical approaches & prevent technical or non-technical threats from reaching your organizations.

Start your journey to security with our interactive lessons & practice with gamified assessments, designed especially to make learning fun.  

Skills You’ll Get

  • Practically Learn about process security audits. 
  • Prepare for technical security audits and Penetration tests. 
  • Understand security infrastructure and policies. 
  • Analyze the impact of threats & types of threats. 
  • Prepare with examples of Information Security Controls. 
  • Secure zones, networks & remote access in various domains. 
  • Utilize Best Practices for Firewalls, Router And Switches, VPN & Wireless Network
  • Prepare for Audit Management as both Auditor & Auditee.

1

Introduction

2

Basics of Information Security

  • Why Information Security
  • What is Information Security
  • Goals
  • Methods
  • Tools
  • Beyond Confidentiality Integrity Availability (CIA)
  • Responsibility of Information Security
  • Perspective of Information Security
3

Threat Paradigm

  • Threats Paradigm
  • Attackers or Threat agents
  • Threat Motivation
  • Threat Impact
  • Types of Attacks
4

Information Security Controls

  • Information Security Controls
  • Examples of Information Security Controls
5

Decoding Policies Standards Procedures& Guidelines

  • Documents Hierarchy
  • Policy
  • Standards
  • Procedures and Guidelines
  • Document Format
  • Decoding Policies and Standards
6

Network Security Design

  • Network Security Design Principles
  • Defense in Depth
  • Security Zones And Network Segmentation
  • Secure Remote Access
  • Secure Third Party Access
  • Least Privilege
  • Segregation Of Duties
  • Encryption
  • High Availability
  • Network Access Control (NAC)
  • Security Of Test Environment
7

Know Your Assets

  • Identifying Assets
  • Different Types of Assets
  • Asset Responsibility
  • Asset Valuation
  • Asset Classification/Rating Review
  • Audit Requirement
8

Implementing Network Security

  • Introducing Assets to Production Environment
  • Pre-Production Check List
  • Best Practices for Network Design
  • Best Practices for Firewall
  • Best Practices For Router And Switches
  • Best Practices for VPN
  • Best Practices For Wireless Network
9

Secure Change Management

  • Change Management
  • Secure Change Management Process
  • Audit Requirements
10

Vulnerability and Risk Management

  • Vulnerability and Risk Management
  • Common vulnerabilities found in Network Environment
  • Vulnerability and Risk Management Process
  • Handling Zero Day
  • Audit Requirements
11

Access Control

  • Introduction
  • Identification
  • Authentication
  • Authorization
  • Accounting
  • Access Control Policies And Procedures
  • Access Control Implementation
  • User Registration And De-Registration
  • Password Management
  • Asset Classification
  • Access Provisioning
  • Network Admission Control (NAC)
  • Privilege User Access Management
  • Remote Access Management
  • Third Party Access Management
  • User Access Review
  • Audit Requirements
12

Capacity Management

  • Capacity Management
  • Documented Policies and Procedures
  • Capacity Management Process
  • Audit Requirements
13

Log Management

  • Logging
  • Log Management Process and Documentation
  • Log Generation
  • Log Transmission
  • Log Storage
  • Log Analysis
  • Log Disposal
  • Audit Requirements
14

Network Monitoring

  • Monitoring
  • Physical, Environmental And Content Monitoring
  • System Monitoring Standards and Procedures
  • Traffic Monitoring
  • Device Monitoring
  • Log Monitoring - Security Information and Event Management
  • Audit Requirements
15

Information Security Audit

  • Information Security Audit
  • Audit Management From Auditor’s Side
  • Audit Management From Auditee's Side
16

Technical Compliance Audit

  • Technical Compliance Audit
  • Technical Compliance Audit from Auditor's Point of view
  • Technical Compliance Audit from Auditee's Point of View
  • Good Practices To Avoid Compliance Findings
17

Penetration Testing

  • Penetration Testing (Pen Test)
  • Stages of Penetration testing
  • Pen-Testing vs. Vulnerability Assessment
  • Pen Testing from Auditee's Point
  • Good Practices to Avoid Vulnerabilities

Any questions?
Check out the FAQs

Want to Learn More?

Contact Us Now

  There are Five famously known network security types - 

  • Firewalls 
  • VPNs
  • AntiVirus
  • Access control
  • Intrusion detection/prevention systems (IDS/IPS)

Yes. Network security is a must for every organization. Non-technical individuals can play an eminent role in ensuring security & preventing threats from reaching the target. The course is designed to help individuals from various platforms learn about network security.

No, you do not need to have any formal experience to take this course. However, a basic knowledge of systems & networks can prove to be helpful.

Definitely! The scope of technical advancements is never-ending and so is the scope of threats. Network security is non-negotiable. The course can open various doors of opportunities for students & learners.

Secure your networks with your practical skills.

Don’t let attackers take the lead! Keep your systems encrypted with the power of your talent.

$239.99

Buy Now

Related Courses

All Course
scroll to top