Objectifs

Learn how to secure your legacy, cloud and virtualized infrastructure.

Cyber incidents become more and more complex. Securing the use of Internet for communication and business starts with understanding known threats and security techniques, following the C-I-A triad philosophy: confidentiality, integrity and availability.

In this three-day course you learn the fundamentals of a secure virtualized enterprise infrastructure. We start from scratch and learn about essential threats, attacks and defences. Theory is illustrated with numerous demos of current security technologies and products.

Destiné à

This course is intended to anyone who doesn’t have any prior security knowledge and wants to understand all the essential key words and terminology. You do not need to be a “techie” to attend this course and to grasp all the IT security vitals. If you have already some security knowledge, this course might fill some gaps or clarify a few things.

Prerequisites: basic knowledge of IP networking and network elements.

"

Seeing that the trainer is an expert in his domain and is mastering everything teached during the class.

"
Maximilien Le Fevere, BPost

Programme

  • Essential security terminology and basic concepts
  • Crypto, hashing and PKI basics
  • Virtual Private Networks: SSL, TLS, SSH & OpenSSH, IPSEC concept and terminology, Site-to-Site configuration, ...
  • Network security: Internet Access Street (IAS) concepts, firewall overview and concepts, NAT, flows, proxy, SSL inspection and interception, UTM, Next-Generation Girewall, web application firewall, ...
  • Virtualization concepts & introduction to VMware ESXi & vSphere, ...
  • Firewall virtualization concept, advantages & deployments: CheckPoint Virtual Edition (vSEC) & VSX, micro-segmentation concepts, ...
  • Integrated Virtualization Services: traditional server security vs hypervisor security, example with Trend Micro Deep Security, VMware vShield, …
  • Introduction to SDN and essential firewalling
  • Availability: introduction and concepts, high availability, clustering concepts with Microsoft Server (FS, VM), firewall clustering, Distributed Denial of Service (DDoS) concepts, anti-DDoS with Arbor and F5, ...
  • End-point security and malware protection: sandboxing, hash filtering, threat extraction, Endpoint Detection and Response (EDR), CP Sandblast Agent, encrypted file systems with LUKS on Linux, ...
  • Sniffing, IDS/IDP: network sniffing and snarfing concepts, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IDP), Security Onion concept, ...
  • FIM - File Integrity Monitoring, with OSSEC
  • Introduction to incident response and forensics with Bluecoat Security Analytics. Introduction to SIEM, logging and intelligence: concepts, Arcsight, Splunk, OpenDNS, IBM Qradar, ...

Formateur(s)

d_03761

Stijn Huyghe

Stijn Huyghe is operational with Proximus since 2001 and is a seasoned cyber security trainer providing and developing courses such as “Linux administration”, “Cyber Security Explored”, “Hacking Explained and Intrusion Detection (HEXID)” and others. He is able to translate technical knowledge into easy-to-understand explanations and demo’s towards a diverse audience. Besides that, he has fun maintaining some parts of the Proximus infrastructure and develops demo’s in the HEXID cyber range for internal and external customers.

Informations pratiques

Prix: 1 872 EUR (hors TVA)

Les formations Kluwer sont susceptibles de bénéficier de différentes subventions. Un instrument pratique qui vous permet de ne payer q'une partie vous-même

Intra-entreprise: Plusieurs collègues ont besoin de cette formation ? Et de préférence sans devoir se déplacer ? Invitez simplement la formation dans votre département ou votre entreprise : pratique ! Le formateur met l’accent sur votre situation, sur votre secteur et sur les questions de vos collaborateurs. Demandez votre formation intra-entreprise.

Partenaires

S'inscrire