Physical Security & Network Hardening

$205.00

CECs

2

Network security is the practice of protecting and preventing unwelcome access attempts to computer networks. In this course, you’ll learn about network hardening techniques and best practices. You’ll learn to secure networks and about wireless authentication and authorization features.

 

Course Highlights

Outline techniques used to harden a network, including securing SNMP, port security, private VLANs, DHCP snooping, and access control lists
Outline the importance of disabling unused ports, such as IP ports and device ports
Recognize how explicit and implicit firewall rules can help harden a network
Describe how to implement WPA and WPA2 in a scenario
Recognize the steps involved in implementing TKIP-RC4 in a given scenario
Outline the purpose and characteristics of common authentication and authorization features, such as EAP, PEAP, EAP-FAST, EAP-TLS, shared or open, preshared key, captive portals, and MAC filtering
Recognize how to implement geofencing in a scenario
Describe the key wireless security considerations, such as antenna placement, power levels, and wireless client and guest network isolation
Recognize IoT security challenges and outline how to protect IoT systems and devices
Describe how to use a VPN, including IPsec, SSL/TLS/DTLS, site-to-site, and client-to-site
Recognize when and where to use remote desktop protocol (RDP) and remote desktop gateways
Outline the purpose and features of using SSH when remotely accessing a network
Describe the benefits of using virtual network computing (VNC) and virtual desktop
Recognize remote authentication and authorization considerations
Describe how to use out-of-band management, such as a modem or console router
Recognize when to implement motion detection and video surveillance
Describe when to implement asset tracking
Outline the purpose and features of tamper detection
Outline the purpose of prevention techniques, such as badges, biometrics, smart cards, key fobs, employee training, access control vestibules, and locks

 

Cancellation Policy

All BICSI Connect courses are nonrefundable and nontransferable.

 

Frequently Asked Questions

Who Should Attend?

This course is ideal for all ICT professionals.

Technical Requirements

  • Operating Systems:

    • Windows: Windows 10 or later
    • Mac: macOS 11 (Big Sur) or later
    • Mobile Devices:

      • iOS: iOS 14 or later
      • Android: Android 10 or later
  • Browsers (latest versions recommended):

    • Google Chrome
    • Mozilla Firefox
    • Microsoft Edge
    • Safari
  • Internet Requirements: A stable high-speed internet connection

How Long is This Workshop?

Two-hour self-paced course with 90 days from the date of purchase to complete