0845 450 6120

Networking Audit and Security

Audience

This is a 3 days hands-on course.

This course is designed for audit and security specialists who need to understand how networks operate, what the sources of risk are and how to manage the risk. Also, the training is particularly relevant to those who manage or are responsible for large corporate networks.

Reset

Learning Objectives

This course covers network technology and the business objectives and risks. In particular, it will help you to find out what is important in the world of networking and become familiar with networking terms so you will be able communicate with your network specialists.

Please note, this course is designed to impart technical understanding to the delegates.  It is not designed to teach audit techniques, standards or remedial plans.

Pre-Requisites

A general familiarity with the use of ICT in businesses, from the viewpoint of a user. You should feel comfortable loading, running and experimenting with software, under guidance from the instructor. You should be able to take in your stride the command line and GUI utilities that are employed on the course.

Course Content

A review of networking technology

Network security concepts

Business issues

Network development lifecycle

Network hardware and software

Risks and objectives

Local area networks

TCP/IP

LAN devices

Directory services

Virtual private networks

Transmission system vulnerabilities

General network management

Ports and sockets

Routing

Various hacking and probing tools

WAN technology

WAN technology

Frame relay

ATM

ISDN

ADSL

Satellite

General network management

Virtual private networks

Remote access

Remote access topologies

Telephone lines

Authenticating remote users – the Shiva corporation

Defending the remote machine

Virtual private networking

Auditing equipment cross the internet

Wireless LANs (WLANs)

IP version 6 (IPV6)


Traffic control

Candidate points of weakness

Standard firewall services

Firewall specimen specification

Firewall deployment

Risk assessment methods

Rule lists and logs

Building a trust infrastructure

Business objectives

Types of encryption

Symmetrical cryptography

PGP

Hash check-summing

SSL

Digital Certificates

VPNs

System security checks

Top 20 system risks in an e-commerce environment

Detection of vulnerabilities

What the hackers do

Best practice in resisting intrusions

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the request service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.

 

Online Courses

You may prefer an online course if you are looking for a flexible and cost-effective solution. Online courses allow you to study at your own pace, at a time that suits you.

We have the following eLearning options available:

Our Customers Include