Ensure the confidentiality, integrity, and availability of your organization’s
information by protecting your communications and data. In this training course, you
learn how to define and implement security principles, install and customize secure
firewalls, build Virtual Private Network (VPN) tunnels, and safeguard your organization’s
network perimeter against malicious attacks.
OBJECTIVE
- Mencegah atau mengurangi efek serangan jaringan dengan firewall
- Deteksi dan tanggapi serangan jaringan dengan Intrusion Detection and Prevention (IDP)
- Merancang, menginstal, dan mengonfigurasi Jaringan Pribadi Virtual (VPN) yang aman
- Mengurangi dampak serangan Denial-of-Service (DoS)
COURSE OUTLINE
- Defining Security Principles
- Ensuring data Confidentiality, Integrity and Availability (CIA)
- Assessing defensive techniques
- Setting a generic security stance
- Developing a Security Policy
- Balancing risk with business requirements
- Identifying your information assurance objectives
- Choosing security technologies
- Deploying a Secure Firewall
- Installing a firewall
- Configuring a firewall to support outgoing services
- Providing external services securely
- Allowing access to internal services
- Detecting and Preventing Intrusion
- Deploying an IDS
- Detecting intrusions in the enterprise
- Interpreting alerts
- Stopping intruders
- Configuring Remote User Virtual Private Networks (VPNs)
- Building VPN tunnels
- Deploying client software
- Creating Site-to-Site VPNs
- Applying cryptographic protection
- Comparing tunneling and protection methods
- Integrating Perimeter Defenses
- Reducing the impact of denial-of-service (DoS) attacks
- Perimeter architectures