
Network Hardening, Network Segmentation, and Secure Connections
$150.00
BICSI Members save more. Login or become a Member today.
CECs
1
In this OnDemand course, ICT professionals will discover how network hardening helps identify potential vulnerabilities, secure systems, and reduce the risk of unauthorized access. This course provides how to secure administrative and remote access connections. ICT professionals will discover key features of the Simple Network Management Protocol (SNMP) and explore the various types of firewalls and logical locations to place them on a network. Discover how to control and manage traffic using rules on routers and firewalls and explore how firewall management can contribute to overall network hardening. Discover how to limit internal and external physical access to resources. Explore best practices for managing telecom and wiring closets as well as considerations for establishing secure access. Lastly, explore the importance of hardening wireless access points and recognize how to harden network elements including firewalls, routers, and access points. This course was originally created by Global Knowledge (GK).
Course Highlights
![]() |
Discover the key concepts covered in this course |
![]() |
Discuss common calls received by help desk support |
![]() |
Discuss considerations when limiting remote admin access |
![]() |
Recognize key decisions when granting administrative access |
![]() |
Provide an overview of using AAA for accessing network devices |
![]() |
Recognize key features of the Simple Network Management Protocol (SNMP) |
![]() |
Discuss types of firewalls and logical locations to place them |
![]() |
List the benefits of segmenting a network |
![]() |
Recognize how to control and manage traffic using rules on routers and firewalls |
![]() |
Discuss how firewall management relates to overall network hardening |
![]() |
Recognize how to disable discovery protocols |
![]() |
Discuss measures to manage resources in a wiring closet |
![]() |
Describe measures to limit internal physical access to resources |
![]() |
Discuss the importance of keeping a telecoms closets secured |
![]() |
Discuss wiring closet flaws and how to avoid them |
![]() |
Harden networks by controlling network device ports |
![]() |
Describe measures to limit external physical access to resources |
![]() |
Describe considerations when establishing secure access |
![]() |
List physical security considerations when performing network hardening |
![]() |
Recognize how and where to filter traffic on a network |
![]() |
Discuss the importance of hardening wireless access points |
![]() |
Use a utility to perform Wi-Fi scanning on a network |
![]() |
List physical security concerns as they relate to wireless access points |
![]() |
Discuss hardening network elements including firewalls, routers, routers, and access points |
![]() |
Secure a network by changing default settings on all IT equipment |
![]() |
Summarize concepts and techniques used to provide device protection on a network |
![]() |
Recognize best practices as they relate to traffic filtering on a network |
Cancellation Policy
All BICSI Connect courses are nonrefundable and nontransferable.
Frequently Asked Questions
Who Should Attend?
This course is intended for all ICT Professionals.
Technical Requirements
-
Operating Systems:
-
Windows: Windows 10 or later
-
Mac: macOS 11 (Big Sur) or later
-
Mobile Devices:
-
iOS: iOS 14 or later
-
Android: Android 10 or later
-
-
-
Browsers (latest versions recommended):
-
Google Chrome
-
Mozilla Firefox
-
Microsoft Edge
-
Safari
-
-
Internet Requirements: A stable high-speed internet connection