close

close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

close

close

Press esc to close

close close

Back to course information

Thank you for your enquiry!

One of our training experts will be in touch shortly to go overy your training requirements.

close close

Thank you for your enquiry!

One of our training experts will be in touch shortly to go over your training requirements.

Course Information

Introduction to System and Network Security Course Outline

 

Module 1: Building a Secure Organisation

  • Real Threats that Impact Cyber Security
  • Hackers Inside and Out
  • Eavesdropping
  • Spoofing
  • Sniffing
  • Trojan Horse
  • Viruses
  • Wiretaps

Module 2: A Cyber Security Policy and Cryptography Primer

  • Assurance Objectives
  • Caesar Cipher
  • Cryptography
  • Symmetric Encryption
  • Data Encryption Standard (DES)
  • Advance Encryption Method (AES)

Module 3: Solving Key Distribution Issues with Asymmetric Encryption

  • Key Management
  • What is OpenPGP/GnuPG?

Module 4: Ensuring Integrity with Hashes

  • Secure Hashing Algorithm
  • Data Integrity
  • Difference Between WEP, WPA, and WPA2
  • Data Integrity
  • Digital Signatures

Module 5: Assessing Traditional Static Password Schemes

  • Preventing Password Cracking
  • Social Engineering Attacks

Module 6: Evaluating Strong Authentication Methods and Authenticating Hosts

  • Preventing Password Replay
  • Multi-Factor Authentication
  • Authenticating
  • What is a Spoofing Attack?
  • IP Address Spoofing Attacks
  • ARP Spoofing Attacks
  • Spoofing Attack Prevention and Mitigation

Module 7: Preventing System Intrusions and Discovering System Vulnerabilities

  • Intrusion Detection Systems (IDSes)
  • Type Of IDS Monitoring
  • Sources of Vulnerabilities
  • Vulnerability Assessment
  • Identification of Vulnerabilities

Module 8: Encrypting Files for Confidentiality

  • Encrypting File System
  • Important Basic Facts About EFS

Module 9: Hardening the Operating System

  • Steps to Use to Secure an Operating System
  • Initial Setup and Patching
  • Remove Unnecessary Services, Applications, and Protocols
  • Configure Users, Groups, and Authentication
  • Configure Resource Controls
  • Install Additional Security Controls
  • Test the System Security

Module 10: Scanning for Vulnerabilities and Reducing DoS Attacks

  • Overview
  • Benefits of Vulnerability Scanner
  • Types of Vulnerability Scanner
  • Nessus Vulnerability Scanner
  • Denial of Service (DoS)
  • Distributed Denial of Service (DDoS)

Module 11: Deploying Firewalls to Control Network Traffic

  • Firewalls to Control Network Traffic
  • Firewalls Design Principles
  • Types of Firewalls
  • Packet-Filtering Router
  • Application-Level Gateway
  • Circuit-Level Gateway

Module 12: Protecting Web Services and Applications

  • Overview
  • Blue Coat WAF Capabilities

Module 13: Threats from the LAN and Confidentiality on External Connections

  • Sniffing the Network
  • Mitigating Threats from Connected Hosts
  • Partitioning the Network to Prevent Data Leakage
  • Identifying Wireless LAN Vulnerabilities
  • Confidentiality with Encryption
  • Securing Communication with IPSec

Show moredowndown

Prerequisites

There are no formal prerequisites in this Introduction to System and Network Security training course.

Audience

This Introduction to System and Network Security course is designed for anyone who wants to gain in-depth knowledge about the system and network security and gain the skills to secure networks.

Introduction to System and Network Security Course Overview

Network Security safeguards data and networks from intrusions, breaches, and other dangers. It is crucial to guard client information, keep shared data secure, provide reliable network performance and access, and protect from cyber threats. A well-developed network security solution decreases expenses and protects organisations from price losses from data violations or other security incidents. Skills gained from this System and Network Security training course will help learners to achieve higher job posts such as Cyber Security Engineer, IT Security Analyst, Cyber Security Analyst, Cyber Security Consultant, Network Security Engineer, and many more. Adding Network Security as a skill in learners' profiles will surely help them climb the ladder of success in value and career opportunities.

Our 1-day Introduction to System and Network Security Training course aims to provide delegates with a comprehensive knowledge of system and network security. During this course, delegates will learn about preventing system intrusions and discovering system vulnerabilities. They will also learn about various essential topics such as eavesdropping, Trojan horse, Caesar cypher, data encryption standard, data integrity, social engineering attacks, IP address spoofing attacks, vulnerability assessment, packet-filtering router, sniffing the network, and many more. Our highly professional trainer with years of experience in teaching such courses will conduct this training course and will help you get a complete understanding of this course.

This training will also cover the following concepts:

  • Hackers inside and out
  • Symmetric encryption
  • Preventing password cracking
  • Multi-factor authentication
  • Configure users, groups, and authentication
  • Bluecoat WAF capabilities
  • Identifying wireless LAN vulnerabilities

At the end of this Introduction to System and Network Security Training course, delegates will be able to deploy firewalls to control network traffic. They will be able to scan for vulnerabilities and reduce DoS attacks. They will also be able to remove unnecessary services, applications, and protocols.

If delegates want to pursue their career in the security sector, they can choose our other popular training courses such as Certified Cyber Security Professional (CCS-PRO), Cyber Security Awareness, Cyber Security Risk Management, and many other courses.

Show moredowndown

  • The Knowledge Academy’s Introduction to System and Network Security Manual
  • Experienced Instructor
  • Completion Certificate

 

Show moredowndown

Why choose us

Ways to take this course

Our easy to use Virtual platform allows you to sit the course from home with a live instructor. You will follow the same schedule as the classroom course, and will be able to interact with the trainer and other delegates.

Our fully interactive online training platform is compatible across all devices and can be accessed from anywhere, at any time. All our online courses come with a standard 90 days access that can be extended upon request. Our expert trainers are constantly on hand to help you with any questions which may arise.

This is our most popular style of learning. We run courses in 1200 locations, across 200 countries in one of our hand-picked training venues, providing the all important ‘human touch’ which may be missed in other learning styles.

best_trainers

Highly experienced trainers

All our trainers are highly qualified, have 10+ years of real-world experience and will provide you with an engaging learning experience.

venues

State of the art training venues

We only use the highest standard of learning facilities to make sure your experience is as comfortable and distraction-free as possible

small_classes

Small class sizes

We limit our class sizes to promote better discussion and ensuring everyone has a personalized experience

value_for_money

Great value for money

Get more bang for your buck! If you find your chosen course cheaper elsewhere, we’ll match it!

This is the same great training as our classroom learning but carried out at your own business premises. This is the perfect option for larger scale training requirements and means less time away from the office.

tailored_learning_experience

Tailored learning experience

Our courses can be adapted to meet your individual project or business requirements regardless of scope.

budget

Maximise your training budget

Cut unnecessary costs and focus your entire budget on what really matters, the training.

team_building

Team building opportunity

This gives your team a great opportunity to come together, bond, and discuss, which you may not get in a standard classroom setting.

monitor_progress

Monitor employees progress

Keep track of your employees’ progression and performance in your own workspace.

What our customers are saying

Frequently asked questions

FAQ's

Please arrive at the venue at 8:45am.
There are no prerequisites for attending this course.
Network Security protects your network and data from breaches, intrusions and other threats.
Eavesdropping is the unauthorised real-time interception of private communication, such as a phone call, instant message, video conference or fax transmission.
DES (Data Encryption Standard) works by using the same key to encrypt and decrypt a message, so both the sender and the receiver must know and use the same private key.
This course is 1 day.
A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital document.
Our Introduction to System and Network Security Training course aims to provide you with a comprehensive knowledge of system and network security. You will also learn about various essential topics such as data encryption standards, data integrity, IP address spoofing attacks, vulnerability assessment, packet-filtering routers, sniffing the network, etc.
The price for Introduction to System and Network Security certification in the United Kingdom starts from £895
The Knowledge Academy is the Leading global training provider in the world for Introduction to System and Network Security.

Why choose us

icon

Best price in the industry

You won't find better value in the marketplace. If you do find a lower price, we will beat it.

icon

Many delivery methods

Flexible delivery methods are available depending on your learning style.

icon

High quality resources

Resources are included for a comprehensive learning experience.

barclays Logo
deloitte Logo
Thames Water Logo

"Really good course and well organised. Trainer was great with a sense of humour - his experience allowed a free flowing course, structured to help you gain as much information & relevant experience whilst helping prepare you for the exam"

Joshua Davies, Thames Water

santander logo
bmw Logo
Google Logo

Looking for more information on Cyber Security Training?

backBack to course information

Get a custom course package

We may not have any package deals available including this course. If you enquire or give us a call on 01344203999 and speak to our training experts, we should be able to help you with your requirements.