The Business Process & IT Best Practices Specialist!
Contact Us
+91 9810609560

Network Security Essentials

Course Description:

This course is an introduction to the essential elements of Network Security. It complements  7S TP-101    in that it gives a deeper understanding of 7S TP-101   topics.

Course Objective

On the completion of this course the delegate will be familiar with some basics concepts of Network Security .It will provide them with critical foundational information concerning firewall technology, security risks and remediation, and network security design and implementation considerations. Additionally, you will learn how to configure and implement firewall appliances and extend the firewall's capability using rules, security applications, and other network specific functions and troubleshooting techniques
Course Requirements: All delegates must complete 7S TP-101 or have permission from our course director before taking this course who will assess that they have basic knowledge of networking concepts, network topologies, and the OSI model of networking protocol.

Course Topics:


  • Basics of Network Security 
  • What is Information Security?
  • Learning about the Goals of Security
  • What are Assets?
  • Learning about Value of Assets
  • What is Risk?
  • Learning about Risk Management
  • What is Threat
  • Learning about Sources of Threat
  • What are Vulnerabilities?
  • Learning about Various Kinds of Vulnerabilities
  • Types of Attacks
  • DoS / DDoS
  • Spoofing
  • Source Routing 
  • Man-in-the-Middle
  • Back Door
  • Password Guessing
  • Brute Force
  • Dictionary
  • Replay Attack
  • Encryption Breaking
  • TCP/IP Hijacking
  • Software Exploitation
  • Social Engineering
  • Malware
  • Virus
  • Trojan Horses
  • Worms 
  • Logic Bombs
  • Areas of Intrusion
  • Network Infrastructure
  • Internet Applications
  • Communications Protocols
  • Protection of Information
  • Building a Defense
  • Securing the Network Infrastructure
  • User Authentication

Remote Access Technologies

  • Virtual Private Network (VPN)
  • Remote Authentication Dial-In User Service (RADIUS)
  • Terminal Access Controller Access Control System (TACACS)
  • Layer Two Tunnelling Protocol / Point to Point Tunnelling Protocol (L2TP/PPTP)
  • Secure Shell (SSH)
  • Internet Protocol Security (IPSEC)
  • Vulnerabilities
  • Wireless Communication
  • Wireless Technology
  • Wireless Standards (802.11 and 802.11x)
  • Wireless Transport Layer Security (WTLS)
  • Wired Equivalent Privacy (WEP)
  • Wireless Application Protocol (WAP)
  • Vulnerabilities
  • Site Surveys
  • Infrastructure Security
  • What is Infrastructure Security?
  • Securing Equipment
  • Securing Equipment Configuration

Securing Connectivity Devices

  • Hubs
  • Switches and Bridges
  • Routers
  • Firewalls
  • RAS
  • Telecommunications Devices-EPABX
  • Modems
  • Wireless

Securing Topologies

  • What are Security Zones?
  • DMZ
  • Intranet
  • Extranet
  • Purpose of Perimeter Network
  • Implementing Network Address Translation (NAT)
  • Using Virtual Local Area Network (VLAN)
  • Tunneling
  • Securing and Monitoring Network Resources
  • Workstations
  • Mobile Devices
  • Virtual Private Network (VPN)
  • Intrusion Detection System (IDS)
  • Network Monitoring / Diagnostics
  • Network Device and Operating System Hardening
  • OS/NOS (Operating System /Network Operating System) Hardening.
  • File System
  • Mobile Devices
  • Network hardening
  • Updates
  • Hot fixes
  • Service Packs
  • Patches
  • Configuration
  • Enabling and Disabling Services and Protocols
  • Access Control Lists
  • Application Hardening
  • Web Servers
  • E-Mail Servers
  • File and Print Servers
  • Domain Name Service (DNS) Servers
  • File Transport Protocol (FTP) Servers
  • Network News Transport Protocol (NNTP) Servers
  • Dynamic Host Configuration Protocol (DHCP) Servers
  • Data Repositories
  • Directory Services

Completion Conditions :

A delegate is considered to have completed this course if he/she attends all three days, and satisfactorily completes the assigned exercises/tasks/tests. On completion each delegate is presented with a certificate of completion for 7 S TP201.

Book a Training Program

Email Id*:

They Speak For Us