google-site-verification=NXAR8NR5U8AGGpVXJNWHON7GWxz4X4yLMkDz_g60ppI
 

Learn the core security concepts to install, monitor, and trouble shoot network security features to safeguard data and devices.

Network security is concerned with granting access to a network to the authorized users, and denying access to a network by the unauthorized users.

It encompasses the actions to prevent attacks from viruses, worms, and Trojan horses; spyware and adware; zero-day/zero-hour attacks; hacker attacks; denial of service attacks; data interception and theft, and identity theft. A network security consists of many hardware and software components.

Network Security - ExponIQ Engineering Services Pvt Ltd

WHAT WILL YOU LEARN?

  • Introduction to Security – Security Principles, Security Threats, Types of attacks.

  • NFP, Secure Management –Telnet, SSH.

  • Wireshark, Zenmap, Syslog, SNMPv3 using ACL

  • NTP Security, SCP , AAA – RADIUS and TACACS+ Technologies

  • Authentication and Authorization using ACS, AAA implementation using TACACS+.

  • Integration of AD with AAA, Functions of 802.1X Components, BYOD and MDM.

  • CCP, Basic Configuration using CCP, Cisco Firewall Technologies, Zone –based firewall.

  • Configuring Zone based firewall. ASA 9.x – Access Management, Security Levels, MPF Configuration, Modes of deployment, HA, Security Contexts.

  • Configuration of ASA Firewall using ASDM.

  • VPN Concepts - Ipsec protocols, delivery modes, Cryptography concepts.

  • Remote access VPN – basic clientless SSL VPN using ASDM AnyConnect SSL VPN using ASDM

  • Endpoint posture Assessment, Site to site VPN Configuration

  • Securing Routing and Switching – Privilege levels. Role based CLI access.

  • Cisco IOS resilient configuration, OSPF Routing update Authentication, Functions of Control Plane policing.

  • Common Layer 2 Attacks and Mitigation Procedures – Port Security.

  • DHCP snooping, Dynamic ARP Inspection, VLAN Security Implications

  • NAT in ASA 9.x. IPS Deployment Considerations and Technologies.

  • Content and Endpoint Security – Email-based threats, Web-based Threats. Mitigation

  • Technology for Endpoint threats.

  • Case Study

Why LIVEWIRE?

  • CERTIFICATION

    • Get trained through an ISO certified institute. Our course completion certificate and material are globally recognized. Skill based certification provided which will add value in resume

  • CERTIFIED FACULTIES

    • All our trainer are Certified in their Products. B2E certified Industry experienced faculty. They ensure students are benefited with in depth practical training.

  • PLACEMENT OPPORTUNITY

    • LIVEWIRE is in association with 250+ corporates, who grab candidates from our centres when they match their job requirement. We offer all these opening to the students. They will be able to directly apply for the openings through our Student Portal.

  • Individual focus
  • Learn the required skill
  • We will guide you on one-mini project
  • Real time application training

DELIVERABLES

  • Material for future reference

  • Internationally recognized Course Completion certificate

  • Skill based Certificate

  • Discounted price for future Upgrade trainings.

  • Best Guidance for your Career

  • Guidance for one mini project

Job opportunities

Major job providers for network security professionals are financial institutions and banks, internet service providers, pharmaceutical companies, government and defense agencies, and multinational corporations.

  • Administrator - Network & Security,

  • Network Security Engineer,

  • Technology Expert - Network Security,

  • Network Security Analyst,

  • Network Security Specialist,

  • Network Security Manager are some of the popular job openings in this domain.

WHO CAN ENROLL?

  • Network Engineering Routing & Switching

Request for Demo
livewire.png

Thanks! Message sent.