Course Title : Essential Elements of Network Security - II
Course Duration : 2 Day Online Intructor Led Workshop 
: Online workshop is delivered in two days, two units each day between 10:15 am to 1 pm and 3 pm to 5:30 pm
Course Fee : Available upon request (Write to us at info@tlcpak.com)
Course Location  : TLC (Karachi), Customer Onsite (Karachi, Lahore, Faisalabad and Islamabad) and Online 
Course Code : TN228-II
Deliverables : Comprehensive Student Guide and Workshop Certificate
PURPOSE:
Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other. IT has changed considerably, moving from a client-server environment to one driven by digital transformation, which increases the interaction of mobile devices, cloud resources such as SaaS and IaaS, and IoT. All this innovation has greatly expanded the ability of people and devices to communicate. What remains constant, however, is that the network, no matter what form it takes, must protect the usability and integrity of network resources.

The training course flow will be a mix of lectures & classroom discussions so that participants can have a detailed understanding of various components of network security.

About this workshop:
This workshop is designed to provide update knowledge on five essential of network security and provide the insight different network security technologies. Understand the challenges faced by corporate security teams how to mitigate security threats and network attacks by using different network security technologies.

After completing this workshop, you will be able to:

  • Understand the role of solution based on Network Access Control.
  • Discuss and understand Cloud Access Security Broker.
  • Distributed Denial-of-Attack Mitigation
  • Demystifying Software-Defined Wide Area ANetwork
ABOUT THE INSTRUCTOR
This workshop shall be delivered by TOGAF 9 Certified/IBM Certfied Infrastructure System Architect and an experienced trainer with 25+ years of career experience imparting education and training services both locally and internationally and have worked for international enterprise technology vendors including IBM, Fujitsu, and ICL. Our instructor holds various industry professional certifications in the space of enterprise servers and storage technologies, Information Security, Enterprise Architecture, ITIL, Cloud, Virtualization, Green IT, and a co-author of 10 IBM Redbooks. 

TARGETED AUDIENCE:
Network teams, Business Technology professionals, audit, risk and compliance, information security, IT operations, Project Management, Cybersecurity professionals,  Enterprise Architects, Technical Writers, and fresh network professionals who want to;

  • Learn essential networking security trends in information and cybersecurity. 
  • Understand Network Access Control and thier use-cases.
  • Learn about Cloud Access Security Broker and its advantages and implementationn.
  • Exploiting Software-Defined Wide Area Network key fundamentals.
A FLEXIBLE PRICING MODEL FOR CORPORATE: 
This workshop can also be delivered for an organization in a private format at their on-site premises subject to 15 - 40 corporate security professionals. For additional information, please contact us.

PREREQUISITES:
Participants attending this workshop should be familiar with basic Information Technology (IT) and Security concepts, business challenges and the role of general system wide infrastructure technologies and their applications. 

COURSE OUTLINE 
Unit 1 – Network Acceess Control
  • What do your device know about you?
  • Assess and mitigate vulnerabilities in mobile systems.
  • Describing the need for having a solution based on Network Access Control.
  • Understand Network Access Control.
  • How NAC Secures Your Network.
  • Exploring the types of Network Access Control.
  • Key components of Network Access Control.
  • Key advantages of Network Access Control.
  • Why is it important to have a NAC solution?
  • Secure network components – NAC devices.
  • What technical features to look when considering NAC solutions?
  • Best practices to implement Network Access Control.
  • Industry Use Cases for Network Access Control.
  • Top Network Access Control vendors.
  • The path to next-generation secure network access.
  • Unit 1 Assessment.
Unit 2 – Cloud Access Security Broker
  • Cloud Computing Defined.
  • Service Oriented Architecture (SOA) and Web Services.
  • Technologies that enable Cloud Computing Framework.
  • Cloud deployment models and workloads. 
  • Understand Cloud Access Security Broker.
  • Security features offered by CASB.
  • How Cloud Access Security Broker work.
  • Requirements of a CASB Solution.
  • Why do I need a CASB solution?
  • Cloud Access Security Broker Solution Deployment Models.
  • Three key considerations for choosing a CASB.
  • Multi-Mode Next-Gen CASB Architecture.
  • Use cases for Cloud Access Security Broker. 
  • Unit 2 Assessment.


Unit 3 – Distributed Denial-of-Service Mitigation
  • Define a Distributed Denial-of-Service (DDoS) Attack.
  • DDoS Mitigation and Mitigation Stages.
  • DoS Verses DDoS Attack.
  • How does a DDoS attack work?
  • Differentiate between the 3 major categories of DDoS attacks.
  • DDoS attack categories details.
  • Identifying DDoS Attacks – Example of Network and Server behaviors.
  • Layer 7 Attacks: Bot Management Solution.
  • Layer 4 Attacks: Use Per-Client Throttling.
  • Ransom DDoS Attacks – Stages and What should you do.
  • Common myths about ransom DDoS attacks.
  • Addressing Ransom DDoS Efficiency – Do’s and Don’ts.
  • Are you prepared for a ransom DDoS attack?
  • What to do during a DDoS attack?
  • Five steps to mitigate data breach risks.
  • Strategy to prevent DDoS attacks – Best Practices.
  • DDoS Protection Services offered by 3rd Party Services Providers.
  • Unit 3 Assessment.
Unit 4 – Exploiting SD-WAN Security
  • Business Challenges that develop the need for considering an SD-WAN.
  • What business problems does SD-WAN solve?
  • Software-defined Wide Area Network (SD-WAN) Defined.
  • Main components that make up the basic structure of an SD-WAN.
  • Main types of SD-WAN Architectures.
  • MPLS defined and difference between SD-WAN and MPLS.
  • MPLS Vs SD-WAN – Pros and Cons.
  • SD-WAN Architecture.
  • How does SD-WAN work?
  • Build an effective SD-WAN security strategy at the branch.
  • Three Models for an SD-WAN Deployment.
  • Evaluate where to deploy the SD-WAN controller.
  • Assess connectivity choices for SD-WAN deployment.
  • SD-WAN and MPLS – Differentiating between the two technologies.
  • Describe SD-WAN Orchestration – Orchestration Vs. Cloud Automation.
  • Other benefits of SD-WAN – Highlights.
  • SD-WAN Use-cases.
  • Unit 4 Assessment.


 
  

List of IBM AIX Operating System 
Standard Courses

AIX 7 Basics

Power Systems for AIX II - AIX Systems Administration

Power Systems for AIX III - Advanced Administration and Problem Determination

Introduction to AIX Korn Shell Scripting - AIX 7,1, AIX 6.1, AIX 5.3 and Linux

AIX 7 Jumpstart for UNIX Professionals

Security for Power Systems AIX

IBM POWER Virtualization Technologies

AIX Disk Storage Management and Recovery Procedures

AIX Performance Monitoring and Management

Introduction to IT Infrastructure Technologies

Understanding the Role of Storage Technologies and Big Data

Linux Basics for Users

 

List of IBM AIX Operating System 
Short-Term Courses

AIX System Configuration Devices & AIX System Storage Overview

AIX Disk Storage Management & Recovery Procedures

AIX Performance Monitoring & Management

Understanding & Managing AIX ODM (Object Data Manager)

Security for Power Systems AIX

AIX Software Installation Maintenance & Backup & Restotore

Working with Logical Volume Manager & File System Administration

AIX Error Monitoring & System Dump Facility & AIX Scheduling

AIX Security & User Administration