Data Communications and IP Technologies black icon
6 Lessons     |      Course Duration: 65 Minutes     |      6 Month License
6  |  65  |   6 Month
Included for FREE! $39 Worth
Course Summary
The Network Security Essentials course enables anyone with minimal knowledge of networking to understand the basics of network security, including the potential risks to your organization, security components including firewalls and mechanisms used by it, encryption and authentication protocols and how they are used for network protection.
What you'll learn

  • The basics of network security, risks and how to prevent them
  • Firewalls principles of operation, including packet filtering, stateful inspection and NAT
  • Site-to-Site and Client-to-Site VPNs
  • Encryption protocols basics and principle of operation
  • Authentication protocols basics and principle of operation
  • Certificates and digital signatures
  • Security components, including the basic operation of IDS/IPS, NAC, SIEM, mail and web filters


Syllabus
Description The Network Security Essentials course starts with introducing the common risks to the organization network, including viruses, worms, Trojans, OS vulnerabilities, DoS/DDoS and more. We talk about the basics of data deletion, duplication and modification risks, OS and applications vulnerabilities, eavesdropping and data forgery, disguised Identities and others. We continue with describing protection mechanisms, including authentication, access control, confidentiality, integrity and others, and how they are used to protect the organization data. Follows the principles part we talk about the purpose and operation principles of firewalls including packet filtering and statefull inspection and VPNs, including the operation of Site-to-Site and Client-to-Site connectivity. We continue with common security protocols, authentication and encryption principles, describing the principles of authentication, from the basic username and password access to challenge-response mechanisms and advanced token and biometrics methods. In the protocols area we talk about basic cryptography, symmetric and asymmetric encryption, Di­e-Hellman algorithm and key-exchange mechanisms, RSA, PKI, KDCs, Certificates and digital signatures. The course is in introduction level, describing the operating principles of network security, preparing the participant to the advanced courses in this section.
Target Audience

Sale and marketing, customer support, R&D, information systems, and anyone interesting in getting to the field of network security


Course Prerequisites

Basic computing and networking knowledge

Objectives Upon completion of this course, the student will be able to:
  • Understand the security risks to the organization network
  • Understand the components that protect the organization
  • Understand the principles of encryption and authentication
  • Understand the operation principles on firewalls and VPNs
  • Understand the most common security mechanisms – RSA, Certificates and digital signatures, tokens, biometrics and more

Course Modules
The course includes the following modules:
  • 1.  Network Security Essentials
    This lesson describes the major security risks that threatens your network, including viruses, worms, Trojans and others
  • 2.  Firewalls and VPNs
    This chapter describes the operation of firewalls, including security zones, packet filtering, stateful inspection, NAT and VPNs
  • 3.  Network Security Elements
    In this chapter we talk about intrusion detection and prevention mechanisms (IDS/IPS), Network Access Control (NAC), Security Information and Event Management systems and other security components
  • 4.  Security Protocols Basics
    Here we talk about threats to information systems, and the building blocks of security – Confidentiality, Integrity and Availability (CIA), and protocols that implements them
  • 5.  Security Protocols
    In this chapter we talk about stream and block cyphers, symmetric and asymmetric encryption, key-exchange algorithms and RSA
  • 6.  Authentication Protocols
    Here we talk about authentication methods, from the basic username and password, challenge-response, tokens and biometric mechanisms, KDCs, Certificates and digital signatures
Take This Course