Introduction to Network
and Security
Course Price
RM 800
Duration: 02 days/16 hours
+
-
Systems and network security will continue to trust the Internet and networked systems to conduct business. In addition, cybercrime and security breaches compromise critical business functions and data. To mitigate security threats, protect sensitive data, and maintain business stamina, protecting computers and networks are critical. It also describes how to assess security from an attacker's perspective to more effectively execute Internet and system defenses.
+
-
Those who need basic skills to develop and implement security programs designed to protect their organization's information from threats.
+
-
The admission fee for this program is RM 800.
Duration: 02 days / 16 hours
+
-
- Physical Classroom Training (Malaysia)
- On-site Company Training (Malaysia)
- Online Training via Microsoft Team (Malaysia and International)
+
-
Basic Computer Knowledge.
+
-
The inquiry process comprises three simple steps.
STEP 1 Submit Inquiry- Tell us a bit about yourself and the questions you want to enquire
STEP 2 Reviewing–Your questions will be processed and answered within a day or two
STEP 3 Response–Answers will typically be sent through email. However, you may tell us the option you prefer us to contact you in
+
-
Building a Secure Organization
-
Real threats that impact cybersecurity
-
Hackers inside and out
-
Eavesdropping
-
Spoofing
-
Sniffing
-
Trojan horses
-
Viruses
-
Wiretaps
-
-
A cyber security policy: the foundation of your protection
-
Defining your information assurance objectives
-
Assessing your exposure
-
A Cryptography Primer
-
Securing data with symmetric encryption
-
Choosing your algorithm: DES, AES, Rc4 and others
-
Assessing key length and key distribution
-
-
Solving key distribution issues with asymmetric encryption
-
Generating keys
-
Encrypting with RSA
-
PGP and GnuPG
-
Evaluating Web of Trust and PKI
-
-
Ensuring integrity with hashes
-
Hashing with Md5 and SHA
-
Protecting data in transit
-
Building the digital signature
-
Guarding Against Network Intrusions
-
Scanning for vulnerabilities
-
Searching for rogue servers
-
Profiling systems and services
-
-
Reducing Denial of Service (DoS) attacks
-
Securing DNS
-
Limiting the impact of common attacks
-
-
Deploying firewalls to control network traffic
-
Preventing intrusions with filters
-
Implementing a cyber security policy
-
Deploying personal firewalls
-
-
Protecting web services and applications
-
Validating user input
-
Controlling information leakage
-
Ensuring Network Confidentiality
-
Threats from the LAN
-
Sniffing the network
-
Mitigating threats from connected hosts
-
Partitioning the network to prevent data leakage
-
Identifying wireless LAN vulnerabilities
-
-
Confidentiality on external connections
-
Ensuring confidentiality with encryption
-
Securing communication with IPSec
-