Network Hardening, Network Segmentation, and Secure Connections

$150.00

CECs

1

In this OnDemand course, ICT professionals will discover how network hardening helps identify potential vulnerabilities, secure systems, and reduce the risk of unauthorized access. This course provides how to secure administrative and remote access connections. ICT professionals will discover key features of the Simple Network Management Protocol (SNMP) and explore the various types of firewalls and logical locations to place them on a network. Discover how to control and manage traffic using rules on routers and firewalls and explore how firewall management can contribute to overall network hardening. Discover how to limit internal and external physical access to resources. Explore best practices for managing telecom and wiring closets as well as considerations for establishing secure access. Lastly, explore the importance of hardening wireless access points and recognize how to harden network elements including firewalls, routers, and access points. This course was originally created by Global Knowledge (GK).

 

Course Highlights

Discover the key concepts covered in this course
Discuss common calls received by help desk support
Discuss considerations when limiting remote admin access
Recognize key decisions when granting administrative access
Provide an overview of using AAA for accessing network devices
Recognize key features of the Simple Network Management Protocol (SNMP)
Discuss types of firewalls and logical locations to place them
List the benefits of segmenting a network
Recognize how to control and manage traffic using rules on routers and firewalls
Discuss how firewall management relates to overall network hardening
Recognize how to disable discovery protocols
Discuss measures to manage resources in a wiring closet
Describe measures to limit internal physical access to resources  
Discuss the importance of keeping a telecoms closets secured  
Discuss wiring closet flaws and how to avoid them  
Harden networks by controlling network device ports  
Describe measures to limit external physical access to resources  
Describe considerations when establishing secure access 
List physical security considerations when performing network hardening 
Recognize how and where to filter traffic on a network 
Discuss the importance of hardening wireless access points 
Use a utility to perform Wi-Fi scanning on a network 
List physical security concerns as they relate to wireless access points 
Discuss hardening network elements including firewalls, routers, routers, and access points 
Secure a network by changing default settings on all IT equipment 
Summarize concepts and techniques used to provide device protection on a network
Recognize best practices as they relate to traffic filtering on a network 

 

Cancellation Policy

All BICSI Connect courses are nonrefundable and nontransferable.

 

Frequently Asked Questions

Who Should Attend?

This course is intended for all ICT Professionals.

Technical Requirements

  • Operating Systems:

    • Windows: Windows 10 or later
    • Mac: macOS 11 (Big Sur) or later
    • Mobile Devices:

      • iOS: iOS 14 or later
      • Android: Android 10 or later
  • Browsers (latest versions recommended):

    • Google Chrome
    • Mozilla Firefox
    • Microsoft Edge
    • Safari
  • Internet Requirements: A stable high-speed internet connection

How Long is This Workshop?

One-hour self-paced course with 90 days from the date of purchase to complete