Course Title |
: Essential Elements of Network
Security - II |
Course Duration |
: 2 Day Online Intructor Led Workshop
: Online workshop is delivered in
two days, two units each day between 10:15 am to 1 pm and 3 pm to 5:30
pm |
Course Fee |
: Available upon request (Write
to us at
info@tlcpak.com) |
Course Location |
: TLC (Karachi), Customer Onsite
(Karachi, Lahore, Faisalabad and Islamabad) and Online |
Course Code |
: TN228-II |
Deliverables |
: Comprehensive Student Guide and
Workshop Certificate |
PURPOSE:
Network security isn't a one-size-fits-all
strategy. Dive into the various segments of network security, and learn
how they overlap and interact with each other. IT has changed considerably,
moving from a client-server environment to one driven by digital transformation,
which increases the interaction of mobile devices, cloud resources such
as SaaS and IaaS, and IoT. All this innovation has greatly expanded the
ability of people and devices to communicate. What remains constant, however,
is that the network, no matter what form it takes, must protect the usability
and integrity of network resources.
The training
course flow will be a mix of lectures & classroom discussions so that
participants can have a detailed understanding of various components of
network security.
About this workshop:
This workshop is designed to provide
update knowledge on five essential of network security and provide the
insight different network security technologies. Understand the challenges
faced by corporate security teams how to mitigate security threats and
network attacks by using different network security technologies.
After completing this
workshop, you will be able to:
-
Understand the role of solution based
on Network Access Control.
-
Discuss and understand Cloud Access
Security Broker.
-
Distributed Denial-of-Attack Mitigation
-
Demystifying Software-Defined Wide Area
ANetwork
ABOUT THE INSTRUCTOR
This workshop shall be delivered
by TOGAF 9 Certified/IBM Certfied Infrastructure System Architect and an
experienced trainer with 25+ years of career experience imparting education
and training services both locally and internationally and have worked
for international enterprise technology vendors including IBM, Fujitsu,
and ICL. Our instructor holds various industry professional certifications
in the space of enterprise servers and storage technologies, Information
Security, Enterprise Architecture, ITIL, Cloud, Virtualization, Green IT,
and a co-author of 10 IBM Redbooks.
TARGETED AUDIENCE:
Network teams,
Business Technology professionals, audit, risk and compliance, information
security, IT operations, Project Management, Cybersecurity professionals,
Enterprise Architects, Technical Writers, and fresh network professionals
who want to;
-
Learn essential
networking security trends in information and cybersecurity.
-
Understand Network
Access Control and thier use-cases.
-
Learn about Cloud
Access Security Broker and its advantages and implementationn.
-
Exploiting Software-Defined
Wide Area Network key fundamentals.
A FLEXIBLE PRICING MODEL
FOR CORPORATE:
This workshop
can also be delivered for an organization in a private format at their
on-site premises subject to 15 - 40 corporate security professionals. For
additional information, please contact us.
PREREQUISITES:
Participants attending this workshop
should be familiar with basic Information Technology (IT) and Security
concepts, business challenges and the role of general system wide infrastructure
technologies and their applications.
COURSE OUTLINE
Unit 1 Network Acceess Control
-
What do your device know about you?
-
Assess and mitigate vulnerabilities
in mobile systems.
-
Describing the need for having a solution
based on Network Access Control.
-
Understand Network Access Control.
-
How NAC Secures Your Network.
-
Exploring the types of Network Access
Control.
-
Key components of Network Access Control.
-
Key advantages of Network Access Control.
-
Why is it important to have a NAC solution?
-
Secure network components NAC devices.
-
What technical features to look when
considering NAC solutions?
-
Best practices to implement Network
Access Control.
-
Industry Use Cases for Network Access
Control.
-
Top Network Access Control vendors.
-
The path to next-generation secure network
access.
-
Unit 1 Assessment.
Unit 2 Cloud Access Security Broker
-
Cloud Computing Defined.
-
Service Oriented Architecture (SOA)
and Web Services.
-
Technologies that enable Cloud Computing
Framework.
-
Cloud deployment models and workloads.
-
Understand Cloud Access Security Broker.
-
Security features offered by CASB.
-
How Cloud Access Security Broker work.
-
Requirements of a CASB Solution.
-
Why do I need a CASB solution?
-
Cloud Access Security Broker Solution
Deployment Models.
-
Three key considerations for choosing
a CASB.
-
Multi-Mode Next-Gen CASB Architecture.
-
Use cases for Cloud Access Security
Broker.
-
Unit 2 Assessment.
|
Unit 3 Distributed Denial-of-Service Mitigation
-
Define a Distributed Denial-of-Service
(DDoS) Attack.
-
DDoS Mitigation and Mitigation Stages.
-
DoS Verses DDoS Attack.
-
How does a DDoS attack work?
-
Differentiate between the 3 major categories
of DDoS attacks.
-
DDoS attack categories details.
-
Identifying DDoS Attacks Example of
Network and Server behaviors.
-
Layer 7 Attacks: Bot Management Solution.
-
Layer 4 Attacks: Use Per-Client Throttling.
-
Ransom DDoS Attacks Stages and What should you do.
-
Common myths about ransom DDoS attacks.
-
Addressing Ransom DDoS Efficiency Dos and Donts.
-
Are you prepared for a ransom DDoS attack?
-
What to do during a DDoS attack?
-
Five steps to mitigate data breach risks.
-
Strategy to prevent DDoS attacks Best
Practices.
-
DDoS Protection Services offered by
3rd Party Services Providers.
-
Unit 3 Assessment.
Unit 4 Exploiting SD-WAN Security
-
Business Challenges that develop the
need for considering an SD-WAN.
-
What business problems does SD-WAN solve?
-
Software-defined Wide Area Network (SD-WAN)
Defined.
-
Main components that make up the basic
structure of an SD-WAN.
-
Main types of SD-WAN Architectures.
-
MPLS defined and difference between
SD-WAN and MPLS.
-
MPLS Vs SD-WAN Pros and Cons.
-
SD-WAN Architecture.
-
How does SD-WAN work?
-
Build an effective SD-WAN security strategy
at the branch.
-
Three Models for an SD-WAN Deployment.
-
Evaluate where to deploy the SD-WAN
controller.
-
Assess connectivity choices for SD-WAN
deployment.
-
SD-WAN and MPLS Differentiating between
the two technologies.
-
Describe SD-WAN Orchestration Orchestration
Vs. Cloud Automation.
-
Other benefits of SD-WAN Highlights.
-
SD-WAN Use-cases.
-
Unit 4 Assessment.
|
|