Network Security Essentials

Cybersecurity

Overview

This course covers the (ISC)2 Common Body of Knowledge (CBK) and evaluates real world. This course covers the basic operating characteristics and risks associated with LANs, WANs, client/server, and other forms of networking and distributed computing architectures. It includes best practices for securing and auditing network applications, interconnection devices and remote access, and perimeter security services. Participants map and organize the use of built-in and add-on tools to security policy and audit requirements to determine the essential topics that must be addressed in compliance and risk management, security administration standards and procedures, and audit programs. The course also includes checklists at the end of each control-related section.

Why you should take this course

For users with an introductory knowledge of this topic, and are searching for additional information and its application.

Here are the topics we'll cover.

  1. Defining the Distributed Information Technology Environment

    • Defining a Network
    • Network Terminology
    • Computing Models
    • Shared Data Networks
    • Client Server Computing
    • Peer-to-Peer Applications
    • Defining the Scope of Network Security and Audit Programs
  2. Network Standards and Protocols

    • Definition of a Protocol
    • Network Communication Standards
    • Rules for Communications
    • Open Systems Interconnection (OSI) Model
    • Common Network Protocols
    • Transmission Control Protocol/Internet Protocol (TCP/IP)
    • Analysis of OSI Layers
    • IEEE 802 Wired and Wireless Standards
    • Geographical Network Delineation: LAN, WAN
    • Untangling the “Nets”: Internet, Intranets, Extranets
    • Network Security Safeguards
  3. Network Media Access Technologies: Local Area Networks (LANs) and Wide Area Networks (WANs)

    • Network Transmission Media
    • Network Topologies
    • Wireless LANs
    • WAN and Internet Connections
    • Switching Techniques
    • Leased Digital Line Services
    • Residential Broadband
  4. Network Interconnection Devices

    • Positioning Network Devices in the OSI Reference Model
    • Network Interconnection Devices – Layers 1-3
    • Network Domains, Virtual LANs and Segmentation
    • Network Interconnection Devices – Layers 4-7
    • Network Device Management/Maintenance Port Access
    • Simple Network Management Protocol (SNMP)
    • Enterprise Authentication Systems
    • Network Device Audit Checklist
    • Security and Audit Tools
  5. Network Host Services Security

    • Common Server Vulnerabilities
    • Server Access Control Architecture
    • System Policies
    • Security Health Checks
    • TCP/IP Application Audits
    • Network File Share Security
    • Remote Control Programs
    • Network Printing Device Security
    • Server Security Audit Checklist
    • Network and Audit Tools
  6. Address Management and Directory Services Security

    • Network Address Management: Dynamic Host Configuration Protocol (DHCP)
    • Overview of Directory Services
    • Domain Name System (DNS)
    • Lightweight Directory Access Protocol (LDAP) Directories
    • Audit Checklist: LDAP, DNS
    • Security and Audit Tools
  7. Network Perimeter Security

    • Hacker Intrusion Objectives
    • Objectives of Network Perimeter Security
    • Network Perimeter Security Strategies
    • Demilitarized Zone (DMZ) Networks
    • Designing and Locating Warning Banners
    • Firewall Policies and Positioning
    • Intrusion Detection/Prevention Systems (IDS/IPS)
    • Virtual Private Networks (VPNs) and Secure Sessions
    • Remote User Authentication
    • Audit Checklists
    • Security and Audit Tools
  8. Network Security Risk Analysis

    • How to Secure Our Networks
    • Network Security Risk Analysis
    • Identifying ad Categorizing the Assets
    • Tracking Network Security Vulnerabilities
    • Network Vulnerability Testing
    • Defining a Network Security Strategy
    • Security and Audit Tools

Learning Style

Instructor Led

Level

Intermediate

Who this course is for

Information Security Professionals and IT Auditors working with networks.

NASBA Certified CPE

24 credits

Field of Study

Auditing

Length of course

24h

Prerequisites

IT Audit School IT Auditing and Controls
or equivalent experience

Advanced Preparation

None
Start Learning Today
Stay ahead of the curve and future-proof your business with training programs designed for you.
Contact Sales

Here are the learning objectives we'll cover

  • Identify key components of Information Technology (IT) in today’s network
  • Define a network security strategy and associated policies.
  • Identify network security threats and vulnerabilities.
  • Evaluate built-in and add-on security tools.
  • Formulate network auditing, vulnerability testing and tool selection strategies.
  • Locate sources of information and tools.

Attendance policy for on-site and online instructor-led training

Students are expected to arrive on time for classes with the proper materials and attitude. An overall attendance rate of 100% is expected to fully absorb the materials and to complete labs. If you have an expected absence, please email support@acilearning.com or your instructor ahead of time. The number of CPEs awarded will be equivalent to the number of hours attended.

ACI Learning is registered with NASBA

ACI Learning is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: https://www.nasbaregistry.org/