PDF Add to WishList
In this cyber security training course, you gain the knowledge and skills to analyze and assess network risks, select and deploy appropriate countermeasures, evaluate methods for strong authentication, search for possible vulnerabilities in operating systems, and reduce your organization’s exposure to dangers in enterprise-wide and virtual private networks.
Real threats that impact cybersecurity
A cyber security policy: the foundation of your protection
Securing data with symmetric encryption
Solving key distribution issues with asymmetric encryption
Ensuring integrity with hashes
Assessing traditional static password schemes
Evaluating strong authentication methods
Discovering system vulnerabilities
Encrypting files for confidentiality
Hardening the operating system
Scanning for vulnerabilities
Reducing Denial of Service (DoS) attacks
Deploying firewalls to control network traffic
Protecting web services and applications
Threats from the LAN
Confidentiality on external connections
Course Tuition Includes:
After-Course Instructor Coaching
When you return to work, you are entitled to schedule a free coaching session with your instructor for help and guidance as you apply your new skills.
After-Course Computing Sandbox
You'll be given remote access to a preconfigured virtual machine for you to redo your hands-on exercises, develop/test new code, and experiment with the same software used in your course.
Free Course Exam
You can take your Learning Tree course exam on the last day of your course or online at any time after class and receive a Certificate of Achievement with the designation "Awarded with Distinction."
Standard Course Hours: 9:00 am – 4:30 pm
*Informal discussion with instructor about your projects or areas of special interest: 4:30 pm – 5:30 pm
FREE Online Course Exam (if applicable) – Last Day: 3:30 pm – 4:30 pm
By successfully completing your FREE online course exam, you will:
"The System and Network Security course has proved really useful, especially understanding how hackers gain information, e.g. initial handshake between client and server, and what to do to minimize their ability to infiltrate."
- G. Charlton, Solution Engineer