0845 450 6120

Networking Audit and Security


This is a 3 days hands-on course.

This course is designed for audit and security specialists who need to understand how networks operate, what the sources of risk are and how to manage the risk. Also, the training is particularly relevant to those who manage or are responsible for large corporate networks.


Learning Objectives

This course covers network technology and the business objectives and risks. In particular, it will help you to find out what is important in the world of networking and become familiar with networking terms so you will be able communicate with your network specialists.

Please note, this course is designed to impart technical understanding to the delegates.  It is not designed to teach audit techniques, standards or remedial plans.


A general familiarity with the use of ICT in businesses, from the viewpoint of a user. You should feel comfortable loading, running and experimenting with software, under guidance from the instructor. You should be able to take in your stride the command line and GUI utilities that are employed on the course.

Course Content

A review of networking technology

Network security concepts

Business issues

Network development lifecycle

Network hardware and software

Risks and objectives

Local area networks


LAN devices

Directory services

Virtual private networks

Transmission system vulnerabilities

General network management

Ports and sockets


Various hacking and probing tools

WAN technology

WAN technology

Frame relay





General network management

Virtual private networks

Remote access

Remote access topologies

Telephone lines

Authenticating remote users – the Shiva corporation

Defending the remote machine

Virtual private networking

Auditing equipment cross the internet

Wireless LANs (WLANs)

IP version 6 (IPV6)

Traffic control

Candidate points of weakness

Standard firewall services

Firewall specimen specification

Firewall deployment

Risk assessment methods

Rule lists and logs

Building a trust infrastructure

Business objectives

Types of encryption

Symmetrical cryptography


Hash check-summing


Digital Certificates


System security checks

Top 20 system risks in an e-commerce environment

Detection of vulnerabilities

What the hackers do

Best practice in resisting intrusions

One Month
Two Months
Three Months
More than Three Months
PRINCE2 Foundation & Practitioner
MSP Foundation & Practitioner
APMP Certificate
ITIL Foundation
Scrum in One Day
Certified ScrumMaster
ISTQB Software Test Foundation
Microsoft Project
BCS Business Analysis Practice
Other - Please Specify Below

Online Courses

You may prefer an online course if you are looking for a flexible and cost-effective solution. Online courses allow you to study at your own pace, at a time that suits you.

We have the following eLearning options available:

Our Customers Include