Physical Security & Network Hardening
$205.00
BICSI Members save more. Login or become a Member today.
CECs
2
Network security is the practice of protecting and preventing unwelcome access attempts to computer networks. In this course, you’ll learn about network hardening techniques and best practices. You’ll learn to secure networks and about wireless authentication and authorization features.
Course Highlights
Outline techniques used to harden a network, including securing SNMP, port security, private VLANs, DHCP snooping, and access control lists | |
Outline the importance of disabling unused ports, such as IP ports and device ports | |
Recognize how explicit and implicit firewall rules can help harden a network | |
Describe how to implement WPA and WPA2 in a scenario | |
Recognize the steps involved in implementing TKIP-RC4 in a given scenario | |
Outline the purpose and characteristics of common authentication and authorization features, such as EAP, PEAP, EAP-FAST, EAP-TLS, shared or open, preshared key, captive portals, and MAC filtering | |
Recognize how to implement geofencing in a scenario | |
Describe the key wireless security considerations, such as antenna placement, power levels, and wireless client and guest network isolation | |
Recognize IoT security challenges and outline how to protect IoT systems and devices | |
Describe how to use a VPN, including IPsec, SSL/TLS/DTLS, site-to-site, and client-to-site |
|
Recognize when and where to use remote desktop protocol (RDP) and remote desktop gateways | |
Outline the purpose and features of using SSH when remotely accessing a network | |
Describe the benefits of using virtual network computing (VNC) and virtual desktop | |
Recognize remote authentication and authorization considerations | |
Describe how to use out-of-band management, such as a modem or console router | |
Recognize when to implement motion detection and video surveillance | |
Describe when to implement asset tracking | |
Outline the purpose and features of tamper detection | |
Outline the purpose of prevention techniques, such as badges, biometrics, smart cards, key fobs, employee training, access control vestibules, and locks |
Cancellation Policy
All BICSI Connect courses are nonrefundable and nontransferable.
Frequently Asked Questions
Who Should Attend?
This course is ideal for all ICT professionals.
Technical Requirements
-
Operating Systems:
-
Windows: Windows 10 or later
-
Mac: macOS 11 (Big Sur) or later
-
Mobile Devices:
-
iOS: iOS 14 or later
-
Android: Android 10 or later
-
-
-
Browsers (latest versions recommended):
-
Google Chrome
-
Mozilla Firefox
-
Microsoft Edge
-
Safari
-
-
Internet Requirements: A stable high-speed internet connection