Local, instructorled live Network Security training courses demonstrate through interactive discussion and handson practice the fundamentals of Network Security and cover topics such as detection, prevention and security testinig for beginners as well as advanced engineers
Network Security training is available as "onsite live training" or "remote live training" Onsite live training can be carried out locally on customer premises in Malaysia or in NobleProg corporate training centers in Malaysia Remote live training is carried out by way of an interactive, remote desktop
NobleProg Your Local Training Provider.
Machine Translated
Testimonials
★★★★★
★★★★★
reaffirm my knowledge and learn many new things
Vale of glamorgan council; Vale of glamorgan council
Course: Cisco ASA/Pix Operation
The scope of training and practical approach to the issue seemed very promising. Unfortunately, due to the fact that the lecturer does not deal with the administration of the Linux system on a daily basis - in my opinion, he is not able to thoroughly cover the topic related to Linux Security. He couldn't answer us many practical questions - he was looking for her on Wikipedia. We also make nmap and Nessus scans ourselves and were interested in answers to specific, detailed questions.
BeyondCorp is an open source Zero Trust security framework that allows employees to work securely from any location without the need for a traditional VPN.
In this instructor-led, live training, participants will learn hands-on how to set up a Zero Security system as they set up and deploy BeyondCorop in a live-lab environment.
By the end of this training, participants will be able to:
- Assess their organization's existing security model. - Shift access controls from the perimeter to individual devices and users. - Deploy applications using a user and device-centric authentication and authorization workflow. - Understand, plan and implement a Zero Trust network within their organization.
Audience
- Network engineers - Cyber security professionals - System architects - IT managers
Format of the Course
- Part lecture, part discussion, exercises and heavy hands-on practice
Note
- To request a customized training for this course, please contact us to arrange.
Since all applications today heavily rely on communication and networks, there is no application security without network security.
This course focuses on network security with a software security viewpoint, and discusses common network attacks and defenses on different OSI layers, with an emphasis on application layer issues, tackling topics like session management or denial of service.
As cryptography is a critical aspect of network security, the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement are also discussed. Instead of presenting an in-depth mathematical and theoretical background, these elements are discussed from a merely practical, engineering perspective, showing typical use-case examples and practical considerations related to the use of crypto, such as public key infrastructures. Security protocols in many areas of secure communication are introduced, with an in-depth discussion on the most widely-used protocol families such as IPSEC and SSL/TLS.
Finally, typical crypto vulnerabilities are discussed – both related to certain crypto algorithms and cryptographic protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE and similar, as well as the RSA timing attack. In each case, the practical considerations and potential consequences are described for each problem, again, without going into deep mathematical details.
Participants attending this course will
- Understand basic concepts of security, IT security and secure coding - Learn about network attacks and defenses at different OSI layers - Have a practical understanding of cryptography - Understand essential security protocols - Understand some recent attacks against cryptosystems - Get information about some recent related vulnerabilities - Get sources and further readings on secure coding practices
This instructor-led, live training in Malaysia (onsite or remote) is aimed at system administrators who wish to prevent malware intrusion with Juniper firewalls.
By the end of this training, participants will be able to:
- Set up the necessary virtual environment to start integrating Juniper firewalls into networks. - Manage packet flow for transit traffic. - Troubleshoot a Juniper device network. - Integrate third-party feeds to block intrusion.
- What is denial of service attacks, Flooding, Sniffing, MIM? - How to break from the network to the server? - How to watch packets on the network (also running on switches)? - Do you watch any combination of the world? - How to monitor the network? - How to configure a firewall? - How to use encrypted connections? - How to create tunnels? - How to log packets? - How to scan ports? - How to reduce the number of unnecessary services on the server?
This instructor-led, live training in Malaysia (onsite or remote) is aimed at software testers who wish to protect their organization's network with Nmap.
By the end of this training, participants will be able to:
- Set up the necessary testing environment to start using Nmap. - Scan network systems for security vulnerabilities. - Discover active and vulnerable hosts.
OpenVAS is an advanced open source framework which consists of several services and tools for network vulnerability scanning and management.
In this instructor-led, live training, participants will learn how to use OpenVAS for network vulnerability scanning.
By the end of this training, participants will be able to:
- Install and configure OpenVAS - Learn the fundamental features and components of OpenVAS - Configure and implement network vulnerability scans with OpenVAS - Review and interpret OpenVAS scan results
Audience
- Network engineers - Network administrators
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
Note
- To request a customized training for this course, please contact us to arrange.
This instructor-led, live training in Malaysia (onsite or remote) is aimed at developers who wish to prevent malware intrusion with Palo Alto Networks.
By the end of this training, participants will be able to:
- Set up the necessary development environment to start developing firewalls. - Deploy a Palo Alto firewall in a cloud server. - Manage packet flow through Palo Alto firewalls. - Interpret QoS classifications and types.
This instructor-led, live training in Malaysia (onsite or remote) is aimed at technical persons who wish to apply the most suitable tools and techniques to secure both telecom as well as wireless networks.