Network Security Training Courses

Network Security Training Courses

Local instructor-led live Network Security training courses in България.

Oтзиви от потребители

★★★★★
★★★★★

Network Security Course Outlines

Име на Kурса
Продължителност
Общ преглед
Име на Kурса
Продължителност
Общ преглед
14 hours
Общ преглед
BeyondCorp is an open source Zero Trust security framework that allows employees to work securely from any location without the need for a traditional VPN.

In this instructor-led, live training, participants will learn hands-on how to set up a Zero Security system as they set up and deploy BeyondCorop in a live-lab environment.

By the end of this training, participants will be able to:

- Assess their organization's existing security model.
- Shift access controls from the perimeter to individual devices and users.
- Deploy applications using a user and device-centric authentication and authorization workflow.
- Understand, plan and implement a Zero Trust network within their organization.

Audience

- Network engineers
- Cyber security professionals
- System architects
- IT managers

Format of the Course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.
14 hours
Общ преглед
Since all applications today heavily rely on communication and networks, there is no application security without network security.

This course focuses on network security with a software security viewpoint, and discusses common network attacks and defenses on different OSI layers, with an emphasis on application layer issues, tackling topics like session management or denial of service.

As cryptography is a critical aspect of network security, the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement are also discussed. Instead of presenting an in-depth mathematical and theoretical background, these elements are discussed from a merely practical, engineering perspective, showing typical use-case examples and practical considerations related to the use of crypto, such as public key infrastructures. Security protocols in many areas of secure communication are introduced, with an in-depth discussion on the most widely-used protocol families such as IPSEC and SSL/TLS.

Finally, typical crypto vulnerabilities are discussed – both related to certain crypto algorithms and cryptographic protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE and similar, as well as the RSA timing attack. In each case, the practical considerations and potential consequences are described for each problem, again, without going into deep mathematical details.

Participants attending this course will

- Understand basic concepts of security, IT security and secure coding
- Learn about network attacks and defenses at different OSI layers
- Have a practical understanding of cryptography
- Understand essential security protocols
- Understand some recent attacks against cryptosystems
- Get information about some recent related vulnerabilities
- Get sources and further readings on secure coding practices

Audience

Developers, Professionals
14 hours
Общ преглед
Juniper Networks provides networking hardware and software. Junos OS enables the creation of advanced firewalls that prevent malware intrusion.

This instructor-led, live training (onsite or remote) is aimed at system administrators who wish to prevent malware intrusion with Juniper firewalls.

By the end of this training, participants will be able to:

- Set up the necessary virtual environment to start integrating Juniper firewalls into networks.
- Manage packet flow for transit traffic.
- Troubleshoot a Juniper device network.
- Integrate third-party feeds to block intrusion.

Format of the Course

- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.

Course Customization Options

- To request a customized training for this course, please contact us to arrange.
14 hours
Общ преглед
During the course, participants will learn:

- What is denial of service attacks, Flooding, Sniffing, MIM?
- How to break from the network to the server?
- How to watch packets on the network (also running on switches)?
- Do you watch any combination of the world?
- How to monitor the network?
- How to configure a firewall?
- How to use encrypted connections?
- How to create tunnels?
- How to log packets?
- How to scan ports?
- How to reduce the number of unnecessary services on the server?
35 hours
Общ преглед
Audience:

System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.
14 hours
Общ преглед
Nmap is a port scanner used for penetration and network testing. Port scanners such as Nmap, discover vulnerable communications on computer network systems.

This instructor-led, live training (onsite or remote) is aimed at software testers who wish to protect their organization's network with Nmap.

By the end of this training, participants will be able to:

- Set up the necessary testing environment to start using Nmap.
- Scan network systems for security vulnerabilities.
- Discover active and vulnerable hosts.

Format of the Course

- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.

Course Customization Options

- To request a customized training for this course, please contact us to arrange.
14 hours
Общ преглед
OpenVAS is an advanced open source framework which consists of several services and tools for network vulnerability scanning and management.

In this instructor-led, live training, participants will learn how to use OpenVAS for network vulnerability scanning.

By the end of this training, participants will be able to:

- Install and configure OpenVAS
- Learn the fundamental features and components of OpenVAS
- Configure and implement network vulnerability scans with OpenVAS
- Review and interpret OpenVAS scan results

Audience

- Network engineers
- Network administrators

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.
21 hours
Общ преглед
Palo Alto Networks offers a platform that includes advanced firewalls and cloud extension. Palo Alto firewalls prevents malware intrusion with an automated approach that delivers consistent security.

This instructor-led, live training (onsite or remote) is aimed at developers who wish to prevent malware intrusion with Palo Alto Networks.

By the end of this training, participants will be able to:

- Set up the necessary development environment to start developing firewalls.
- Deploy a Palo Alto firewall in a cloud server.
- Manage packet flow through Palo Alto firewalls.
- Interpret QoS classifications and types.

Format of the Course

- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.

Course Customization Options

- To request a customized training for this course, please contact us to arrange.
7 hours
Общ преглед
pfSense is an open source network security software. Using pfSense, users can create a dedicated firewall for a network.

This instructor-led, live training (onsite or remote) is aimed at network engineers who wish to use pfSense to protect and secure networks.

By the end of this training, participants will be able to:

- Protect a network with a pfSense firewall.
- Implement security features, such as virtual private networks and proxy servers.
- Manage network security with pfSense.

Format of the Course

- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.

Course Customization Options

- To request a customized training for this course, please contact us to arrange.
35 hours
Общ преглед
Wireless and telecom network security refers the practices carried out to safeguard communication devices, terminal equipment, routing equipment, servers and Wireless devices and networks against malicious attacks.

This instructor-led, live training (onsite or remote) is aimed at technical persons who wish to apply the most suitable tools and techniques to secure both telecom as well as wireless networks.

Format of the Course

- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.

Course Customization Options

- To request a customized training for this course, please contact us to arrange.
Weekend Network Security courses, Evening Network Security training, Network Security boot camp, Network Security instructor-led, Weekend Network Security training, Evening Network Security courses, Network Security coaching, Network Security instructor, Network Security trainer, Network Security training courses, Network Security classes, Network Security on-site, Network Security private courses, Network Security one on one training

Специални оферти

Абонамент за специалните оферти

Ние се отнасяме с Вашите данни поверително и не ги предоставяме на трети страни. Можете да промените настройките си по всяко време или да се отпишете изцяло.

НЯКОИ ОТ НАШИТЕ КЛИЕНТИ

is growing fast!

We are looking for a good mixture of IT and soft skills in Bulgaria!

As a NobleProg Trainer you will be responsible for:

  • delivering training and consultancy Worldwide
  • preparing training materials
  • creating new courses outlines
  • delivering consultancy
  • quality management

At the moment we are focusing on the following areas:

  • Statistic, Forecasting, Big Data Analysis, Data Mining, Evolution Alogrithm, Natural Language Processing, Machine Learning (recommender system, neural networks .etc...)
  • SOA, BPM, BPMN
  • Hibernate/Spring, Scala, Spark, jBPM, Drools
  • R, Python
  • Mobile Development (iOS, Android)
  • LAMP, Drupal, Mediawiki, Symfony, MEAN, jQuery
  • You need to have patience and ability to explain to non-technical people

To apply, please create your trainer-profile by going to the link below:

Apply now!