Network engineering security training

Want to learn and gain a deep understanding of cybersecurity and transform yourself into a cybersecurity expert?

Contact Us

Business coaching for leaders

Course Overview

The course aims to bring network security knowledge to network engineers, the course starts with laying the basics of information security and moves to detection and response to cyber threats, as well as the use of Threat Intelligence to predict and prevent cyber attacks, these are all important aspects of protecting digital corporate assets. It is a network security course that is intended to assist enterprises in the development and deployment of the most comprehensive network defense system possible.

Day 1 – Introduction to security

Key Learnings

  • Module 1 – Fundamentals of security
  • Module 2 – Data security
  • Module 3 – Security awareness and social engineering
  • Module 4 – Cyber security technologies

Day 2 – Network and host security

Key Learnings

  • Module 1 – Network attacks and defense strategies
  • Module 2 – Administrative network security
  • Module 3 – Technical network security
  • Module 4 – Network perimeter security
  • Module 5 – Endpoint security (Windows, Linux, Mobile devices)

Day 3 – Enterprise network security

Key Learnings

  • Module 1 – Enterprise virtual networks
  • Module 2 – Cloud security: Shadow IT, taxonomy of cloud services today.
  • Module 3 – Workload security (Code as-a-Service, Containers, Kubernetes) and SaaS
  • Module 4 – Traffic monitoring and analysis
  • Module 5 – Security Architecture and Design & Telecommunications and Network Security

Day 4 – Risk assessments, attack surface and business continuity

Key Learnings

  • Module 1 – Today’s threat landscape and adversaries
  • Module 2 – Dealing with Malware with a focus on Ransomware
  • Module 3 – Conducting risk assessments and components
  • Module 4 – Operations security
  • Module 5 – Business continuity and disaster recovery

Day 5 – Radio telecommunication security and emerging technologies

Key Learnings

  • Module 1 – Threats and attacks of radio communications
  • Module 2 – Attacking wireless infrastructure, access controls, cryptography
  • Module 3 – Attacking wireless clients
  • Module 4 – Software defined networks, Software Defined Radio
  • Module 5 – Emerging technologies – 5G, IoT, IIoT, AI/ML

Check out our trainers' profiles, accreditations & testimonials.

AS SEEN ON

Contact Us Today

Feel free to contact us through phone or email. We are just a contact away to meet all your training needs and will provide you with a proposal within a day.

Reach us now

Phone: +65 9362 6498

Email: jeffreywi@exceledgeintl.com

Open chat
Hello 👋
How we can help you?