Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Network Security, Firewalls, and VPNs

Learn the major business challenges and threats that are introduced when an organization’s network is connected to the public internet.

GK# 3436

Course Overview

TOP

This course provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization's network is connected to the public Internet. This course also provides a comprehensive explanation of network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures.

In addition to premium instructional content from Jones & Bartlett Learning's comprehensive Information Systems Security and Assurance (ISSA) curriculum, this course provides access to a customized "virtual sandbox" learning environment that aggregates an unparalleled spectrum of cybersecurity applications. Providing instant, unscheduled access to labs from the convenience of a web-browser, this course allows you to practice "white hat" hacking on a real IT infrastructure-these are not simulations. Winner of the "Security Training and Educational Programs" top prize at the prestigious 2013 Global Excellence Awards by Info Security Products Guide, the industry's leading information security research and advisory guide, these labs provide valuable exposure to complex, real world challenges and over 20 hours of training exercises on how hackers and perpetrators use these applications and tools.

Certification:

This course covers content within the following industry certification exams:

  • Certified Information Systems Security Professional (CISSP) - two content domains covered
  • Security + - "Network Security" domain
  • 8570.01 - "Network Security"
  • Systems Security Certified Practitioner (SSCP) - "Networks and Communications" domain

What You'll Learn

TOP
  • Transmission Control Protocol/Internet Protocol (TCP/IP) behavior and applications used in IP networking
  • Fundamental concepts of network security
  • The impact that malicious exploits and attacks have on network security
  • Network security tools and discuss techniques for network protection
  • Fundamental functions performed by firewalls
  • Firewall design strategies
  • Foundational concepts of VPNs
  • Network security implementation strategies and the roles each can play within the security life cycle
  • Elements of firewall and VPN implementation and management
  • Network security management best practices and strategies for responding when security measures fail

Outline

TOP
Viewing outline for:

Virtual Classroom Live Outline

1. Foundations of Network Security

  • Fundamentals of Network Security
  • Firewall Fundamentals
  • VPN Fundamentals
  • Network Security Threats and Issues

2. Technical Overview of Network Security, Firewalls, and VPNs

  • Network Security Implementation
  • Network Security Management
  • Firewall Basics
  • Firewall Deployment Considerations
  • Firewall Management and Security
  • Using Common Firewalls
  • VPN Management
  • VPN Technologies

3. Implementation, Resources, and the Future

  • Firewall Implementation
  • Real-World VPNs
  • Perspectives, Resources, and the Future

Labs

TOP
Viewing labs for:

Virtual Classroom Live Labs

Lab 1: Analyze Essential TCP/IP Networking Protocols

Lab 2: Network Documentation

Lab 3: Network Discovery and Reconnaissance Probing using ZenMap GUI (Nmap)

Lab 4: Perform a Software Vulnerability Scan and Assessment with Nessus®

Lab 5: Configure a Microsoft Windows Workstation Internal Firewall

Lab 6: Design a De-Militarized Zone (DMZ) for a LAN-to-WAN Ingress/Egress

Lab 7: Implement a VPN Tunnel between a Microsoft Server and Microsoft Clients

Lab 8: Design a Layered Security Strategy for an IP Network Infrastructure

Lab 9: Construct a Linux Host Firewall and Monitor for IP Traffic

Lab 10: Design and Implement Security Operations Management Best Practices

Software used in these labs include: Wireshark, PuTTY, FileZilla, Tftpd32, RSA NetWitness Investigator, Cisco IOS, Zenmap GUI, Nessus, Microsoft Windows Firewall, Microsoft Windows Network Policy Server (NPS), DVWA, Gufw, Bmon, Iftop, Pktstat, Iperf, Tcptrack, and Splunk. Please note that software may be updated or changed to keep pace with new data in the field.

Who Should Attend

TOP
  • Information security analysts
  • Payroll specialists
  • IT infrastructure security specialists
  • People who decide which information technology and cybersecurity products to acquire for their organization

Follow-On Courses

TOP
Course Delivery

This course is available in the following formats:

Virtual Classroom Live

Experience expert-led online training from the convenience of your home, office or anywhere with an internet connection.

Duration: 5 day

Request this course in a different delivery format.
Enroll