This course provides a comprehensive overview of cyber-security control technologies. The course starts with a discussion of security policies and perimeter security fundamentals and then moves to a discussion on how to design network borders for maximum security and how to monitor them for unauthorized activity. Then after an introduction to firewalls, packet filtering, and access lists, the course discusses how to set up routers, special-purpose firewalls, and general-purpose hosts with security in mind. Much of the class centers on security-conscious design, both for green field projects and existing networks that need expansion or improvement.
Prerequisites: Information Security Essentials or equivalent experience.
VIRTUAL OPTION is available for this class. Choose “VIRTUAL – Live at Your Desk” from the Course Choice drop-down menu. Students still participate in classes, but do so virtually via a computer and internet connection using WebEx. Please click HERE for more info about set-up and system requirements for virtual sessions.
For more information contact: email@example.com or 314-977-3226