2810 Fundamentals Of Network Security
Curso
En Tijuana
¿Necesitas un coach de formación?
Te ayudará a comparar y elegir el mejor curso para ti y a financiarlo en cómodas cuotas mensuales.
Descripción
-
Tipología
Curso
-
Lugar
Tijuana
Objetivo del curso: This course provides students with the knowledge and skills to begin supporting network security within an organization.
Sedes y fechas disponibles
Ubicación
Inicio
Inicio
Opiniones
Programa académico
Lesson 1: Preparing to Secure Information
-
Explaining How Assets Are Attacked
-
Explaining How Assets Are Secured
Lesson 2: Implementing Secure Computing Baselines
-
Introduction to Trusted Computing Bases
-
Establishing a Secure Baseline
-
Monitoring a Secure Baseline
-
Physically Securing Computers
-
Maintaining a Secure Baseline
Lesson 3: Securing Information Using Authentication and Access Control
-
Introduction to Access Control
-
Implementing an Authentication Strategy
-
Implementing an Access Control Strategy
Lesson 4: Using Cryptography to Secure Information
-
Introduction to Cryptography
-
Using Symmetric Encryption
-
Using Hash Functions
-
Using Public Key Encryption
Lesson 5: Using a PKI to Secure Information
-
Introduction to Certificates
-
Introduction to Public Key Infrastructure
-
Deploying and Managing Certificates
Lesson 6: Securing Internet Applications and Components
-
Securing Web Servers
-
Configuring Security for Common Internet Protocols
-
Configuring Security for Web Browsers
-
Configuring Security for Databases
Lesson 7: Implementing Security for E-Mail and Instant Messaging
-
Securing E-Mail Servers
-
Securing E-Mail Clients
-
Securing Instant Messaging
Lesson 8: Managing Security for Directory Services and DNS
-
Securing Directory Services Against Common Threats
-
Securing DNS Against Common Threats
Lesson 9: Securing Data Transmission
-
Identifying Threats to Network Devices
-
Implementing Security for Common Data Transmission
-
Implementing Security for Remote Access
-
Implementing Security for Wireless Network Traffic
Lesson 10: Implementing and Monitoring Security for Network Perimeters
-
Introduction to Network Perimeters
-
Implementing Security on Inbound and Outbound Network Traffic
-
Monitoring Network Traffic
Lesson 11: Managing Operational Security
-
Establishing Security Policies and Procedures
-
Educating Users about Security Policies
-
Applying Security Policies to Operational Management
-
Resolving Ethical Dilemmas When Securing Assets
Lesson 12: Preserving Business Continuity
-
Preparing to Recover from Disasters
-
Communicating the Impact of Risks
-
Performing a Secure Backup and Recovery
Lesson 13: Responding to Security Incidents
-
Identifying Security Incidents
-
Responding to Security Incidents
-
Investigating Security Incidents
¿Necesitas un coach de formación?
Te ayudará a comparar y elegir el mejor curso para ti y a financiarlo en cómodas cuotas mensuales.
2810 Fundamentals Of Network Security