<blockquote id="ad0y4" ></blockquote>

<blockquote id="ad0y4" ><meter id="ad0y4" ></meter></blockquote>

  • <source id="ad0y4" ></source>
  • <nobr id="ad0y4" ></nobr>

        <noscript id="ad0y4" ></noscript>
        <dl id="ad0y4" ><ins id="ad0y4" ><listing id="ad0y4" ></listing></ins></dl>

        <progress id="ad0y4" ><ol id="ad0y4" ></ol></progress>
      1. <dfn id="ad0y4" ></dfn>
          <optgroup id="ad0y4" ><dfn id="ad0y4" ><span id="ad0y4" ></span></dfn></optgroup>

          RKG Logo training-ITBiz
          RKG Logo
          幸运彩票手机版官网 Courses Fees Schedule REGISTER NOW Corporate Training Locations
          ITBiz
          columtop
          Microsoft Office Tools
          Adobe Acrobat Courses
          SharePoint Training
          Microsoft Dynamics
          Social Media Courses
          Project Management
          Application Devp Tools
          Oracle Developer Tools
          Data Warehouse & BI
          Data Base & System Admin
          Programming Languages
          Reporting Tools
          Networking & Security
          Web Technologies
          BootCamps
          Medical Records
          Business Skills
          ERP Training
          Corporate Training On-Site
          columnbottom
          ITBiz
          columnbottom
          System Security & Network
          System Security & Network
          System Security & Network - Introduction
           
          Software Version Red Hat Linux 5 and Windows Servers
          Course Duration 4 Days
          Course Type Class Room and Instructor-Led On-Line (E-Learning) Hands-On Training
          Course Overview In today's Internet-dependent business environment, organizations must link their systems across enterprise-wide and virtual private networks, as well as connect mobile users. Each connection increases exposure to customers, competitors and hackers, magnifying vulnerability to attack. In this course, you learn how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to network threats. Exercises and workshops provide you with experience analyzing system and network security. Activities include:
          • Cracking passwords using rainbow tables
          • Scanning systems with Microsoft Baseline Security Analyzer (MBSA)
          • Restricting computer access with biometrics
          • Preventing unwanted network access with a personal firewall
          • Encrypting and signing important data
          • Discovering security best practices
          Intended Audience for this course This course is designed for IT professionals who want to build network and security administration skills in networking and security management.
          Course Topics
          Building a Secure Organization
          • Real threats that impact security
          • Hackers inside and out
          • Eavesdropping
          • Spoofing
          • Sniffing
          • Trojan horses
          • Viruses
          • Wiretaps
          A security policy: the foundation of your protection
          • Defining your information assurance objectives
          • Assessing your exposure
          A Cryptography Primer
          • Securing data with symmetric encryption
          • Choosing your algorithm: DES, AES, RC4 and others
          • Assessing key length and key distribution
          Solving key distribution issues with asymmetric encryption
          • Generating keys
          • Encrypting with RSA
          • PGP and GnuPG
          • Evaluating Web of Trust and PKI
          Ensuring integrity with hashes
          • Hashing with MD5 and SHA
          • Protecting data in transit
          • Building the digital signature
          Verifying User and Host Identity
          • Assessing traditional static password schemes
          • Creating a good quality password policy to prevent password guessing and cracking
          • Protecting against social engineering attacks
          • Encrypting passwords to mitigate the impact of password sniffing
          Authenticating hosts
          • Shortcomings of IP addresses
          • Address-spoofing issues and countermeasures
          • Solutions for wireless networks
          Preventing System Intrusions
          • Discovering system vulnerabilities
          • Searching for operating system holes
          • Discovering file permission issues
          • Limiting access via physical security
          Encrypting files for confidentiality
          • Encryption with application-specific tools
          • Recovering encrypted data
          Hardening the operating system
          • Locking down user accounts
          • Securing administrator's permissions
          • Protecting against viruses
          Guarding Against Network Intrusions
          • Scanning for vulnerabilities
          • Restricting access to critical services
          • Preventing buffer overflows
          Reducing denial-of-service (DoS) attacks
          • Securing DNS
          • Limiting the impact of common attacks
          Deploying firewalls to control network traffic
          • Analyzing shortcomings of stateless packet filters
          • Contrasting stateful packet filters with application proxies
          • Preventing intrusions with filters
          Building network firewalls
          • Evaluating firewall features
          • Selecting an architecture and a personal firewall
          Ensuring Network Confidentiality
            Threats from the LAN
          • Sniffing the network
          • Mitigating threats from connected hosts
          • Partitioning the network to prevent data leakage
          • Identifying wireless LAN vulnerabilities
          • Confidentiality on external connections
          • Ensuring confidentiality with encryption
          • Securing data-link layer with PPTP and L2TP
          • Middleware information assurance with SSL and TLS
          • Deploying SSH (the Secure Shell)
          Protecting data with IPsec
          • Authenticating remote locations
          • Tunneling traffic between sites
          • Exchanging keys
          Managing Your Organization's Security
          • Developing a security plan
          • Responding to incidents
          • Enumerating the six critical steps

          Enroll Online   

          Live Chat
          Enroll Online
          Enroll By Fax
          Fee & Schedule
          Send Message
          Testimonials
          ITBiz
          columtop
          columnbottom
          ITBiz
          Follow us on .....
          ITBiz
          For further information call 949-387-3772 or FAX 949-681-8247 or email to info@
          SONU Training is the training wing of RKG Technologies Inc
          Disclaimer: RKG Technologies is not linked with Microsoft, Oracle, Adobe, IBM or any other software company we provide training
          幸运彩票手机版官网 © 2004 RKG Technologies Inc. All rights reserved.