About this Event

Physical Security & Network Hardening

COURSE DESCRIPTION

Network security is the practice of protecting and preventing unwelcome access attempts to computer networks. In this course, you’ll learn about network hardening techniques and best practices. You’ll learn to secure networks and about wireless authentication and authorization features.

    Why should you attend?

    You’ll examine remote access methods and security considerations, VPN solutions, and the benefits of using virtual network computing and virtual desktop solutions. You’ll learn about remote authentication and authorization considerations and how to implement out-of-band management.

    What to expect?

    Technical Requirements

    All BICSI CONNECT courses require an internet-capable device and internet connection.

    Java software; Windows 7 or 8; Mac OSx10.6+; Android 4.1 or later; Apple 10S 6.x, 7.x; IE 10 or later; Firefox 21 or later; Chrome 29 or later; Safari 5.1.8 or later; sound card with speakers/headphones for audio (audio not available for all courses); pop-up blockers disabled.

    Who should attend?

    This course is ideal for all ICT professionals.

    What will I learn?

    After this course you will be able to:

    • Outline techniques used to harden a network, including securing SNMP, port security, private VLANs, DHCP snooping, and access control lists
    • Outline the importance of disabling unused ports, such as IP ports and device ports
    • Recognize how explicit and implicit firewall rules can help harden a network
    • Describe how to implement WPA and WPA2 in a scenario
    • Recognize the steps involved in implementing TKIP-RC4 in a given scenario
    • Outline the purpose and characteristics of common authentication and authorization features, such as EAP, PEAP, EAP-FAST, EAP-TLS, shared or open, preshared key, captive portals, and MAC filtering
    • Recognize how to implement geofencing in a scenario
    • Describe the key wireless security considerations, such as antenna placement, power levels, and wireless client and guest network isolation
    • Recognize IoT security challenges and outline how to protect IoT systems and devices
    • Describe how to use a VPN, including IPsec, SSL/TLS/DTLS, site-to-site, and client-to-site
    • Recognize when and where to use remote desktop protocol (RDP) and remote desktop gateways
    • Outline the purpose and features of using SSH when remotely accessing a network
    • Describe the benefits of using virtual network computing (VNC) and virtual desktop
    • Recognize remote authentication and authorization considerations
    • Describe how to use out-of-band management, such as a modem or console router
    • Recognize when to implement motion detection and video surveillance
    • Describe when to implement asset tracking
    • Outline the purpose and features of tamper detection
    • Outline the purpose of prevention techniques, such as badges, biometrics, smart cards, key fobs, employee training, access control vestibules, and locks

    How long is this course?

    Two-hour self-paced course with 90 days from the date of purchase to complete

    Can I earn credit?

    Earn 2 Continuing Education Credits (CECs) upon successfully completing this program.

    What is the cancellation policy?

    All BICSI CONNECT courses are nonrefundable and nontransferable.


      Event Details

      Event

      Physical Security & Network Hardening $205.00

      Dates

      Start : 2/11/2024 12:00:00 AM

      End :2/12/2029 11:59:00 PM

      Location

      BICSIConnect

      EVENT CALENDAR