Course Code



35 Hours


There are no specific requirements needed to attend this course.




System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.



     Course Outline

Module 1: Introduction to Network Security

  • Network topology; Network Types and the OSI Model

Module 2: Network Protocols

  • Network Protocols: SLIP; PPP; ARP; RARP; IGMP; ICMP; SNMP, HTTP
  • IP: Attacks and Countermeasures
  • TCP, UDP: Attacks and Countermeasures
  • FTP, TFTP, TELNET, SMTP: Vulnerabilities

Module 3: Security Policy

  • What is Security Policy?
  • What Defines a good security policy
  • Security Policy Structure
  • Developing and Implementing security policies
  • Requirements of Effective Security Policy

Module 4: Physical Security

  • Physical Security Threats
  • Locks and Keys
  • Fire Safety: Fire Suppression, Gaseous Emission Systems
  • Laptop Security: Physical Security Countermeasures
  • Biometric Devices
  • PC Security: Boot Access

Module 5: Network Attacks

  • Current Statistics
  • Defining Terms: Threats, Attack and Exploit
  • Classification of Hackers and Attacks
  • Spoofing; Spamming; Eaves Dropping; Phishing; War Dialing; Password Cracking
  • Web Page Defacement; SQL Injection; Wire Tapping; Buffer Overflow
  • War Driving; War Chalking; War Flying
  • Denial of Service (DOS) Attacks and Distributed DOS

Module 6: Intrusion Detection System

  • Characteristics of IDS
  • Host based IDS Vs Network based IDS
  • IDS Detection Methods; Types of Signatures
  • Intrusion Prevention System
  • IDS Vs IPS
  • IPS Tool

Module 7: Firewalls

  • Handling threats and security tasks
  • Protection against hacking
  • Centralization and Documentation
  • Multi-layer firewall protection
  • Packet filtering and Stateful Packet Filtering
  • Multi firewall DMZ
  • Specialty firewalls and Reverse firewalls

Module8: Packet Filtering and Proxy Servers

  • Network Address Translation
  • Application layer gateway and Proxying
  • Virtual Private Network and the Authentication process

Module 9: Bastion Host and Honeypots

  • Bastion Host
  • Honeypots and Honeynet

Module 10: Hardening Routers

  • Internet work Operating Systems (IOS)
  • Troubleshooting a router
  • Hardening a Router
  • Components of router security
  • Router security: testing tools

Module 11: Hardening Operating Systems Security

  • Windows Security
  • Objects And Permissions
  • NTFS File System Permissions
  • Active Directory
  • Kerberos Authentication And Security
  • IP Security
  • Linux

Module 12: Patch Management

  • Red Hat Up2date Patch Management Utility Installation Steps
  • Microsoft Patch Management Process and Windows Update Services
  • Patch Management Tools: Qchain
  • Patch Management Tool: Microsoft Baseline Security Analyzer
  • Other Patch Management Tools

Module 13: Application Security

  • Securing Web Applications
  • IPSec And SSL Security
  • Writing Secure Code; Best Practices
  • Remote Administration Security

Module 14: Web Security

  • Network Devices and Design
  • Altering the Network Addresses
  • Client Authorization and Secure Client Transmissions
  • Portable Applications
  • Malicious Code Detection
  • Browser Security Settings
  • Common Gateway Interface (CGI)
  • Web Application Input Data Validation and Buffer Overflows

Module 15: E-Mail Security

  • Components Of An Email
  • E-mail protocols
  • E-Mail Security Risks
  • How to defend against E-Mail security risks

Module 16: Encryption

  • Firewalls Implementing Encryption
  • Maintaining confidentiality
  • Digital certificates
  • Public and Private Keys (including PGP)
  • Choosing the size of keys
  • Analyzing popular encryption schemes including IPSEC

Module 17: Virtual Private Networks

  • VPN Tunneling Protocols
  • PPTP and L2TP
  • VPN Security

Module 18: WLAN

  • Wireless Network Types
  • Antenna
  • WLAN Standards
  • BlueTooth And Ultra Wideband
  • WEP Description Tool (Air Snort and WEPCrack)
  • WLAN Security;WPA; TKIP; WTLS
  • EAP Methods
  • Advanced Encryption Standards (AES); DES; RSA Encryption
  • RADIUS; Multifactor Authentication
  • Mobile Security Through Certificates
  • Certificate Management Through PKI

Module 19: Creating Fault Tolerance

  • Network Security: Fault Tolerance
  • Why Create Fault Tolerance
  • Planning For Fault Tolerance
  • Reasons For System Failure
  • Preventive Measures

Module 20: Incident Response

  • What Is an Incident
  • Step by Step Procedure
  • Managing Incidents
  • What Is an Incident Response
  • Six Step Approach for Incident Handling (PICERF Methodology)
  • Incident Response Team

Module 21: Disaster Recovery and Planning

  • What is a Disaster Recovery
  • Disaster Recovery Planning
  • Business Continuity Planning Process
  • Disaster Prevention

Module 22: Network Vulnerability Assessment

  • Vulnerability Assessment
  • Goals of vulnerability assessment
  • Network vulnerability Assessment methodology:
  • Selecting vulnerability assessment tools

     Feedback (8)

Richard was very knowledgable, clearly knew the subject area extremely well. Broke all of the complicated parts down into easier to understand chunks, and had great rapport with the group. He made a potentially tough and dry subject interesting. As a complete novice, I really enjoyed and found it very helpful for my role.

- Capita Business Services Ltd

For a very intense course, Richard gave a good high level overview for people who work in an IT Department but not actually undertaking the IT aspects of a job e.g. Cloud solutions, platforming, architecture...

- Capita Business Services Ltd

Trainer was very engaging.

Ryan Goddard - Capita Business Services Ltd

Friendly informative and met objectives.

- Capita Business Services Ltd

The content, very interesting.

Lowri Jones - Capita Business Services Ltd

Trainer, knowledge of trainer and ability to communicate complicated content and make it understandable.

- Capita Business Services Ltd

I like the logic of training.

- 博世汽车苏州

I like TCP/IP.

周 涛 - 博世汽车苏州

The course could be tailored to suit your needs and objectives. It can also be delivered on your premises if preferred.



Online Price per participant 6000 AED


Classroom Price per participant 6000 AED





  Workday courses take place between 9:30 and 16:30


  Show venue details

Number of Participants

Related Courses

Total Courses 5

Certificate of Cloud Security Knowledge

  14 hours


Comprehensive C# and .NET Application Security

  21 hours

C/C++ Secure Coding

  21 hours

Advanced Java Security

  21 hours

Standard Java Security

  14 hours

Java and Web Application Security

  21 hours

Advanced Java, JEE and Web Application Security

  28 hours

.NET, C# and ASP.NET Security Development

  14 hours

Advanced C#, ASP.NET and Web Application Security

  21 hours

Microsoft SDL Core

  14 hours


Fundamentals of Corporate Cyber Warfare

  14 hours

Software-Defined Networking (SDN)

Software-Defined Networking (SDN)

What is Software-Defined Networking (SDN)?

ONAP for Network Orchestration and Automation

  28 hours

ONAP for Automating Telecommunication Systems and Operations

  21 hours

Open Source Intelligence (OSINT)

Open Source Intelligence (OSINT)

What is Open Source Intelligence (OSINT)?

Open Source Intelligence (OSINT) Advanced

  21 hours

Open Source Cyber Intelligence - Introduction

  7 hours

Discounted Public Courses

This site in other countries/regions