Course AWR-138-W

Web-based Training (Self-Paced)

Network Assurance

Length
0 h
ACE
0 h
semester
0 h

About Course

The Network Assurance course covers secure network practices to protect networked systems against attacks and exploits. Topics include authentication, authorization and accounting (AAA), as well as firewalls, intrusion detection/prevention, common cryptographic ciphers, server and client security, and secure policy generation. This course also includes information on securing cloud-based networks and applications.

Objectives

Upon successful completion of this course, participants will be able to:

  • Understand the purpose of a firewall, application layer firewalls and stateful packet inspection firewalls
  • Differentiate between NAT and PAT firewall
  • Understand the purpose of Intrusion Detection Systems
  • Understand the general functionality of host-based and network-based ID
  • Understand anomaly detection
  • Understand the purpose and protection of Intrusion Prevention Systems and and host IPS
  • Understand the need for maintaining the security of encryption keys
  • Differentiate between common encryption standards
  • Understand common VPN topologies and configurations (tunneling, etc.)
  • Understand encryption algorithms at varying layers of the TCP/IP stack
  • Understand the purpose of logging and auditing
  • Understand data logging in Unix (and related) systems and in Windows
  • Understand the need for securing log files
  • Obtain familiarity with common functionality offered by Windows and Unix auditing tools
  • Differentiate between authentication and authorization
  • IT and cybersecurity staff interested in furthering their knowledge base regarding network security and assurance, as well as individuals interested in learning about network security and assurance.

Target Audience

IT and cybersecurity staff interested in furthering their knowledge base regarding network security and assurance, as well as individuals interested in learning about network security and assurance.

Prerequisites

It is recommended that participants take the AWR-173 Information Security Basics course, or have a good knowledge and understanding of the following topics: Patching and updating; Firewalls; Malware; Confidentiality, integrity and availability; Disclosure, alteration and denial; Vulnerabilities, attacks and controls; Types of attacks and attackers; Controls; Access Control; TCP/IP Networking; Networking basics and security; Operating system security; Encryption.

(Note: credit hours through ACE are provided only if all four courses, AWR-138, AWR-139, AWR-173 & AWR-178, within the Online for IT Professionals (Cyber 201) track are completed).

Register

Upcoming

Nothing upcoming.

Online

Register online through our partner.

Contact

TEEX NERRTC (Texas A&M)

Email

BCS@teex.tamu.edu

Phone

(979) 431-4837

Website

http://teex.org/program/cybersecurity/

Future

To sign up for a future delivery for this course, join the waitlist by reaching out via the contact information. Click below to send a prefilled email.

Contact

TEEX NERRTC (Texas A&M)

Email

BCS@teex.tamu.edu

Phone

(979) 431-4837

Website

http://teex.org/program/cybersecurity/

congressionally Funded Training Available

Thousands trained nationwide.

Join the NCPC mailing list