Network Operations Specialist Training (Network, Data, and Communications Security)

Network Operations Specialist Training (Network, Data, and Communications Security)

$198.00
{{option.name}}: {{selected_options[option.position]}}
{{value_obj.value}}

Training Formats:      Instructor-Led, Self-Paced Duration:        5 Days Course Overview Having a solid defense-in-depth strategy for architecting and operating networked technology provides organizations with operational resilience from cyber-attacks and data breaches. Students will learn key concepts about security architecture, network segmentation, defense in-depth, encryption technologies, and backup/replication sites, including cloud-based servers and services. Activities/Labs:   Lab Environment Orientation Creating Recommendations Based on Vulnerability Assessments Sensitive Information Identification Post Incident Service Restoration Securing Linux for System Administrators Cybersecurity Testing with Core Impact Identify Whether High-Risk Systems Were Affected Assess A High-Risk System Vulnerability Identification and Remediation Vulnerability Scan Analysis Creation of Standard Operating Procedures for Recovery Implement Single System Changes in Firewall Secure Software Developer - Python Code Review Identifying Malicious Network Connections Identifying Intrusion and Mitigating Attacks with RHEL Server Capstone Securing Linux - Firewalls Setting Up Zones in a Firewall Tweaking Firewall Rules for Detection Rogue Device Identification and Blocking Network Segmentation (FW/DMZ/WAN/LAN) Auditing Service Accounts and Setting up Automated Log Collection Firewall Setup and Configuration Detect the Introduction of a Malicious Application LNX101 - Setting Up a Firewall with UFW and Firewalled IDS Setup and Configuration Introduction to OWASP Top Ten: Capstone Gap Analysis of Firewall Rules Identify Access to a LINUX Firewall through SYSLOG Service System Administrator Capstone (Auditing and Log Collection) Baseline Systems in Accordance with Policy Documentation Core Impact Web Application Penetration Testing System Hardening Windows System Hardening Report Writing for Presentation to Management Analysis and Recommendation Report Log Correlation & Analysis to Identify Potential IOC LNX101 - OpenSSH Installation, Configuration, and Hardening

Show More Show Less