Sales Ended

Cybersecurity Training Class

Event Information

Share this event

Date and Time

Location

Location

Mac Jason Academy

104 Industrial Boulevard

Suite G

Sugar Land, TX 77479

View Map

Refund Policy

Refund Policy

Refunds up to 7 days before event

Friends Who Are Going
Event description

Description

This course is designed to provide student with the knowledge and resources needed to begin a career in IT Security. After attending this course, the student should have a better understanding and applicability of the three main anchors or domains of information security – Confidentiality, Integrity, and Availability.

In the interactive, lab-filled environment of this Cyber Security course, students will gain in-depth knowledge and practical experience with current, essential security systems.

Students will learn how perimeter defenses work and become proficient in the use of network security tools and techniques needed to enhance a network’s defenses. The student should be able to understand the importance of risk management, and recognize the most common threat factors.

After completing this course, the students will have a clearer sense of the right professional certification exams or courses to take in order to propel his or her career in IT Security.

Course Outline (Course delivery is a combination of 50% Practical Labs and 50% Theory)


1. Building blocks of Security

    1. Protocols
      1. UDP
      2. TCP/IP
      3. ICMP
      4. TCP/IP Deeper Dive – The OSI Model Layers and TCP/IP Layers)
        1. The OSI Model Layers
          1. Application Layer
          2. Host to Host Transport Layer
          3. Internet Layer
          4. Network Interface Layer

  1. The 7 Layers of TCP/IP (Probably Don’t Need These Silly Protocols Anyway)
    1. Application Layer
    2. Presentation Layer
    3. Session Layer
    4. Transport Layer
    5. Network Layer
    6. Data Layer
    7. Physical Layer

2. Putting It Together

  1. Network
    1. LANs
    2. WANs
    3. Cloud
    4. Switches – Data Layer
    5. Routers – Network Layer
    6. Perimeter Security
      1. Firewalls
        1. Packets
        2. Traffic
        3. zones
        4. Stateful Inspection
        5. Content filtering
        6. URL filtering
        7. Deep Packet Inspection
        8. Submitting a firewall request

3. Intrusion Detection Systems (IDS)

4. Intrusion Prevention Systems (IPS)

5. Next Generation Firewalls

6. AAA

    1. Authentication
      1. Single-factor authentication
      2. Multi-factor authenticatio
      3. Authorization
      4. Accounting


7. Cryptography/PKI

  • Data Encryption
  1. Certificates
  • Digital Signatures
  1. Hash

8. Identity Federation

  • What is it?
  • How is it used?
  • Benefits

9. DNS (Domain Name Service)

  • Can be configured to help protect the organization

10. Directory Services – X.509

  • LDAP
  • Active Directory (AD)
  1. Domain Controllers
  • Importance of directory services in an organization

11. Cyber-Threats

  • System security vulnerabilities vs Application security vulnerabilities
  • Social Engineering
  1. Exploits behavioral tendencies (Willingness to help; Respect for authority)
  2. Targets social media (Facebook, LinkedIn, Twitter)
  • Hacking web servers
  • Hacking websites
  • Denial of Service Attack (DOS)
  • System Hacking
  • Viruses & Worms
  • Trojan Horse
  • Phishing Email Attacks
  • Spear phishing Attacks

12. Preventing Phishing Email Attacks

  • Check the “From” Address
  • Think before your click
  • Do not engage in chain emailing

13. The Weakest Link

  • Separate your private online life from your corporate life

14. Patching and updating your systems

15. Backup

16. Q&A

Share with friends

Date and Time

Location

Mac Jason Academy

104 Industrial Boulevard

Suite G

Sugar Land, TX 77479

View Map

Refund Policy

Refunds up to 7 days before event

Save This Event

Event Saved