Network Security Training Courses

Network Security Training Courses

Οι τοπικοί κύκλοι κατάρτισης μέσω δικτύων με επίκεντρο το μάθημα του Δικτύου, επιδεικνύουν μέσω της διαλογικής συζήτησης και πρακτικής άσκησης τις βασικές αρχές της Ασφάλειας Δικτύου και καλύπτουν θέματα όπως η ανίχνευση, η πρόληψη και η δοκιμή ασφάλειας για αρχάριους καθώς και για προηγμένους μηχανικούς. Η εκπαίδευση για την Ασφάλεια Δικτύου είναι διαθέσιμη ως "onsite live training" ή "remote live training". Η επιτόπια κατάρτιση σε πραγματικό χρόνο μπορεί να πραγματοποιηθεί σε τοπικό επίπεδο στις εγκαταστάσεις του πελάτη Ελλάδα ή σε εταιρικά κέντρα κατάρτισης NobleProg στο Ελλάδα . Η απομακρυσμένη ζωντανή προπόνηση πραγματοποιείται μέσω μιας διαδραστικής, απομακρυσμένης επιφάνειας εργασίας. NobleProg - Ο τοπικός παροχέας εκπαίδευσης

Testimonials

★★★★★
★★★★★

Network Security Subcategories

Network Security Course Outlines

Title
Duration
Overview
Title
Duration
Overview
14 hours
Overview
BeyondCorp is an open source Zero Trust security framework that allows employees to work securely from any location without the need for a traditional VPN.

In this instructor-led, live training, participants will learn hands-on how to set up a Zero Security system as they set up and deploy BeyondCorop in a live-lab environment.

By the end of this training, participants will be able to:

- Assess their organization's existing security model.
- Shift access controls from the perimeter to individual devices and users.
- Deploy applications using a user and device-centric authentication and authorization workflow.
- Understand, plan and implement a Zero Trust network within their organization.

Audience

- Network engineers
- Cyber security professionals
- System architects
- IT managers

Format of the Course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.
14 hours
Overview
Since all applications today heavily rely on communication and networks, there is no application security without network security.

This course focuses on network security with a software security viewpoint, and discusses common network attacks and defenses on different OSI layers, with an emphasis on application layer issues, tackling topics like session management or denial of service.

As cryptography is a critical aspect of network security, the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement are also discussed. Instead of presenting an in-depth mathematical and theoretical background, these elements are discussed from a merely practical, engineering perspective, showing typical use-case examples and practical considerations related to the use of crypto, such as public key infrastructures. Security protocols in many areas of secure communication are introduced, with an in-depth discussion on the most widely-used protocol families such as IPSEC and SSL/TLS.

Finally, typical crypto vulnerabilities are discussed – both related to certain crypto algorithms and cryptographic protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE and similar, as well as the RSA timing attack. In each case, the practical considerations and potential consequences are described for each problem, again, without going into deep mathematical details.

Participants attending this course will

- Understand basic concepts of security, IT security and secure coding
- Learn about network attacks and defenses at different OSI layers
- Have a practical understanding of cryptography
- Understand essential security protocols
- Understand some recent attacks against cryptosystems
- Get information about some recent related vulnerabilities
- Get sources and further readings on secure coding practices

Audience

Developers, Professionals
35 hours
Overview
Audience:

System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.
14 hours
Overview
OpenVAS is an advanced open source framework which consists of several services and tools for network vulnerability scanning and management.

In this instructor-led, live training, participants will learn how to use OpenVAS for network vulnerability scanning.

By the end of this training, participants will be able to:

- Install and configure OpenVAS
- Learn the fundamental features and components of OpenVAS
- Configure and implement network vulnerability scans with OpenVAS
- Review and interpret OpenVAS scan results

Audience

- Network engineers
- Network administrators

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.
35 hours
Overview
η ασφάλεια του δικτύου

Wireless και τηλεπικοινωνιών αναφέρεται στις πρακτικές που διεξάγονται για τη διασφάλιση των συσκευών επικοινωνίας, του τερματικού εξοπλισμού, του εξοπλισμού δρομολόγησης, των διακομιστών και των ασύρματων συσκευών και δικτύων από κακόβουλες επιθέσεις.

αυτή η καθοδηγούμενη από εκπαιδευτικούς, ζωντανή εκπαίδευση (επιτόπου ή απομακρυσμένη) απευθύνεται σε τεχνικά πρόσωπα που επιθυμούν να εφαρμόσουν τα καταλληλότερα εργαλεία και τεχνικές για να διασφαλίσουν τόσο τις τηλεπικοινωνίες όσο και τα ασύρματα δίκτυα.

μορφή του μαθήματος

- διαδραστική διάλεξη και συζήτηση.
- πολλές ασκήσεις και εξάσκηση.
- εφαρμογή σε περιβάλλον ζωντανού εργαστηρίου.

επιλογές προσαρμογής μαθήματος

- για να ζητήσετε μια προσαρμοσμένη εκπαίδευση για αυτό το μάθημα, παρακαλούμε επικοινωνήστε μαζί μας για να κανονίσετε.

Upcoming Network Security Courses

Weekend Network Security courses, Evening Network Security training, Network Security boot camp, Network Security instructor-led, Weekend Network Security training, Evening Network Security courses, Network Security coaching, Network Security instructor, Network Security trainer, Network Security training courses, Network Security classes, Network Security on-site, Network Security private courses, Network Security one on one training

Course Discounts

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients

is growing fast!

We are looking to expand our presence in Greece!

As a Business Development Manager you will:

  • expand business in Greece
  • recruit local talent (sales, agents, trainers, consultants)
  • recruit local trainers and consultants

We offer:

  • Artificial Intelligence and Big Data systems to support your local operation
  • high-tech automation
  • continuously upgraded course catalogue and content
  • good fun in international team

If you are interested in running a high-tech, high-quality training and consulting business.

Apply now!