Course Overview
                                                                
                                                                 What You Will Learn
                                
                                                                        
                                        
                                        Network Attacks and Defence Strategies
                                    
                                                                        
                                        
                                        Administrative Network Security
                                    
                                                                        
                                        
                                        Technical Network Security
                                    
                                                                        
                                        
                                        Network Perimeter Security
                                    
                                                                        
                                        
                                        Endpoint Security-Windows Systems
                                    
                                                                        
                                        
                                        Endpoint Security-Linux Systems
                                    
                                                                        
                                        
                                        Endpoint Security- Mobile Devices
                                    
                                                                        
                                        
                                        Endpoint Security-IoT Devices
                                    
                                                                        
                                        
                                        Administrative Application Security
                                    
                                                                        
                                        
                                        Data Security
                                    
                                                                        
                                        
                                        Enterprise Virtual Network Security
                                    
                                                                        
                                        
                                        Enterprise Cloud Network Security
                                    
                                                                        
                                        
                                        Enterprise Wireless Network Security
                                    
                                                                        
                                        
                                        Network Traffic Monitoring and Analysis
                                    
                                                                        
                                        
                                        Network Logs Monitoring and Analysis
                                    
                                                                        
                                        
                                        Incident Response and Forensic Investigation
                                    
                                                                        
                                        
                                        Business Continuity and Disaster Recovery
                                    
                                                                        
                                        
                                        Risk Anticipation with Risk Management
                                    
                                                                        
                                        
                                        Threat Assessment with Attack Surface Analysis
                                    
                                                                        
                                        
                                        Threat Prediction with Cyber Threat Intelligence
                                    
                                                                     
                                
                                                                 Who Should Attend
                                
                                    The course is designed for Network Administrators, Network Security Administrators, Network Security Engineers, Network Defense Technicians, Security Analysts and anyone who needs to work in network security.
                                 
                                
                                                                 Prerequisites
                                
                                    – Knowledge of the TCP/IP protocol;
– Basic knowledge of Windows operating systems;
– Basic knowledge of Linux operating systems.