25,000+ Courses Nationwide
0345 4506120

Networking Audit and Security


This is a 3 days hands-on course.

This course is designed for audit and security specialists who need to understand how networks operate, what the sources of risk are and how to manage the risk. Also, the training is particularly relevant to those who manage or are responsible for large corporate networks.

Select specific date to see price, venue and full details.

Learning Objectives

This course covers network technology and the business objectives and risks. In particular, it will help you to find out what is important in the world of networking and become familiar with networking terms so you will be able communicate with your network specialists.

Please note, this course is designed to impart technical understanding to the delegates.  It is not designed to teach audit techniques, standards or remedial plans.


A general familiarity with the use of ICT in businesses, from the viewpoint of a user. You should feel comfortable loading, running and experimenting with software, under guidance from the instructor. You should be able to take in your stride the command line and GUI utilities that are employed on the course.

Course Content

A review of networking technology

Network security concepts

Business issues

Network development lifecycle

Network hardware and software

Risks and objectives

Local area networks


LAN devices

Directory services

Virtual private networks

Transmission system vulnerabilities

General network management

Ports and sockets


Various hacking and probing tools

WAN technology

WAN technology

Frame relay





General network management

Virtual private networks

Remote access

Remote access topologies

Telephone lines

Authenticating remote users – the Shiva corporation

Defending the remote machine

Virtual private networking

Auditing equipment cross the internet

Wireless LANs (WLANs)

IP version 6 (IPV6)

Traffic control

Candidate points of weakness

Standard firewall services

Firewall specimen specification

Firewall deployment

Risk assessment methods

Rule lists and logs

Building a trust infrastructure

Business objectives

Types of encryption

Symmetrical cryptography


Hash check-summing


Digital Certificates


System security checks

Top 20 system risks in an e-commerce environment

Detection of vulnerabilities

What the hackers do

Best practice in resisting intrusions

Related Courses

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the requested service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.


We work with the best