ITM4510 - Network and Security Applications

(ANC-ITM4510.AE1)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

Securing the Infrastructure

  • A Quick Primer on Infrastructure Security
  • Access Control
  • Security Policies
  • Physical Security Controls
  • Access-Control Gates
  • Authentication Systems
  • Remote-Access Monitoring
  • Hands-On Exercises-1
  • Video Surveillance Systems
  • Hands-On Exercises-2
  • Intrusion-Detection and Reporting Systems
  • Hands-On Exercises-3
2

Securing Local Hosts

  • The Three Layers of Security
  • Securing Host Devices
  • Hands-On Exercises-1
  • The Inner Perimeter
  • Hands-On Exercises-2
  • Protecting Local Computing Devices
  • Implementing Local Protection Tools
  • Using Local Intrusion-Detection Tools
  • Configuring Browser Security Options
  • Defending Against Malicious Software
  • Hardening Operating Systems
  • Overseeing Application Software Security
  • Applying Software Updates and Patches
  • Hands-On Exercises-3
3

Securing Local Networks

  • The Basics of Networking Protocols
  • Network Control Strategies
  • Hands-On Exercises-1
  • The Basics of Network Servers
  • Hands-On Exercises-2
  • Network Switches
  • Routers
  • Gateways
  • Network Bridges
  • Wireless Network Connectivity
  • Hands-On Exercises-3
  • The Basics of Network Transmission MEDIA
  • Transmission Media Vulnerabilities
  • Hands-On Exercises-4
4

Securing the Perimeter

  • The Basics of Internet Security
  • Understanding the Environment
  • Hands-On Exercises-1
  • Understanding Private Networks
  • Hands-On Exercises-2
  • Understanding the Perimeter
  • Firewalls
  • Network Appliances
  • Proxy Servers
  • Demilitarized Zones (DMZs)
  • Honeypots
  • Extranets
  • Hands-On Exercises-3
5

Protecting Moving Data, Tools and Utilities and Defending Against Vulnerabilities

  • Securing Data in Motion
  • Cryptography
  • Hands-On Exercises-1
  • Using Basic Tools
  • Monitoring Tools and Software
  • Hands-On Exercises-2
  • Zero Day Vulnerabilities
  • Software Exploits
  • Social Engineering Exploits
  • Network Threats and Attacks
  • Dictionary Attacks
  • Denial of Service (DoS) Attacks
  • Spam
  • Other Exploits
  • Hands-On Exercises-3
A

Appendix A: NIST Preliminary Cybersecurity Framework

  • Identify
  • Protect
  • Detect
  • Respond
  • Recover

1

Securing Local Hosts

  • Establishing Lockout Policies
  • Configuring Auditing in Windows
  • Configuring Application Control Policy
  • Enabling Event Logging
2

Securing Local Networks

  • Monitoring the Denial of Service (DoS) Attack
  • Viewing the Application, Security, and System Logs
3

Securing the Perimeter

  • Creating a Virtual Switch
  • Enabling Hyper-V in Windows
4

Protecting Moving Data, Tools and Utilities and Defending Against Vulnerabilities

  • Using MD5 Hash Algorithms
  • Creating a New Software Restriction Policy

Related Courses

All Courses
scroll to top