• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

300 Network & Security courses in Windlesham

Securing Linux systems

5.0(3)

By Systems & Network Training

Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing Linux systems
Delivered in Internationally or OnlineFlexible Dates
£3,697

Cyber Security Overview 1 Day Training in Bracknell

By Mangates

Cyber Security Overview 1 Day Training in Bracknell

Cyber Security Overview 1 Day Training in Bracknell
Delivered In-Person + more
£595 to £795

Cyber Security Overview 1 Day Training in Wokingham

By Mangates

Cyber Security Overview 1 Day Training in Wokingham

Cyber Security Overview 1 Day Training in Wokingham
Delivered In-Person + more
£595 to £795

Cyber Security Overview 1 Day Training in Windsor Town

By Mangates

Cyber Security Overview 1 Day Training in Windsor Town

Cyber Security Overview 1 Day Training in Windsor Town
Delivered In-Person + more
£595 to £795

Cyber Security Overview 1 Day Training in Fleet

By Mangates

Cyber Security Overview 1 Day Training in Fleet

Cyber Security Overview 1 Day Training in Fleet
Delivered In-Person + more
£595 to £795

Cyber Security Overview 1 Day Training in Guildford

By Mangates

Cyber Security Overview 1 Day Training in Guildford

Cyber Security Overview 1 Day Training in Guildford
Delivered In-Person + more
£595 to £795

Cyber Security Overview 1 Day Training in Slough

By Mangates

Cyber Security Overview 1 Day Training in Slough

Cyber Security Overview 1 Day Training in Slough
Delivered In-Person + more
£595 to £795

Cyber Security Overview 1 Day Training in Heathrow

By Mangates

Cyber Security Overview 1 Day Training in Heathrow

Cyber Security Overview 1 Day Training in Heathrow
Delivered In-Person + more
£595 to £795

Cyber Security Overview 1 Day Training in Reading

By Mangates

Cyber Security Overview 1 Day Training in Reading

Cyber Security Overview 1 Day Training in Reading
Delivered In-Person + more
£595 to £795

Securing Microsoft systems

5.0(3)

By Systems & Network Training

Microsoft security training course description A hands on training course focusing on security in the Microsoft environment. The course progresses from patch management onto the use of Microsoft security tools. Then server, desktop and network security are studied in the Microsoft environment. What will you learn Use Microsoft security tools. Secure Microsoft servers. Secure Microsoft desktops. Secure Microsoft networks. Microsoft security training course details Who will benefit: Technical server support staff. Technical desktop support staff. Technical network staff. Technical security staff. Prerequisites: Supporting Windows server 2016 Networking Microsoft systems. Duration 3 days Microsoft security training course contents Introduction Security threats, Microsoft defaults, admin accounts, security patches, patch management, patch tools. Hands on: Studying Microsoft defaults, applying security patches. Microsoft security tools Microsoft updates, WSUS, Inventory tool, baseline security analyser, URLscan, EventCombMT, Cipher security tool, Port reporter, PortQry. Tools hackers use. Hands on: Using Microsoft security tools. Server security Checklists, core server security, AD, Member server security, Domain controller security, Specific roles. Hands on Hardening Microsoft servers, security templates. Active Directory Admin authority in AD, group policy, trust and authentication. Desktop security Checklists, core client security, anti virus software, anti spyware software, firewalls, securing clients with AD, securing clients with group policy, software restriction policies. Hands on Securing Microsoft desktops. Network security Checklist, IP security, VPNs, PKI, certificate authorities, RAS, RRAS, IAS. Hands on: VPN configuration, IAS configuration. Monitoring Auditing, authorisation and logons, tracking, system monitoring, detecting attacks. Hands on: Monitoring Microsoft systems. Summary Microsoft security response centre, security advisories.

Securing Microsoft systems
Delivered in Internationally or OnlineFlexible Dates
£3,497

Educators matching "Network & Security"

Show all 10
Mangates

mangates

5.0(1)

London

WHO WE ARE? “Mangates” is one of the Leading Competency developers, Mangates has developed a proven foundation for building specialized training programs. No matter which Mangates training division you are working with, you can expect the same high-quality training experience and expertise that makes Mangates stand out above the competition. All of our instructors are recognized experts in their fields with hands-on experience on the topics they teach. We combine proven adult educational training methods with leading-edge industry expertise to provide you an exceptional training experience. Every instructor must meet rigorous standards with the proven background in their given field of expertise. It is the difference that our customers covet and participant appreciates at the completion of the course. WHAT WE DO? We deliver training solutions to Corporate, Government Agencies, Public sectors, Multinational organizations and Private Individuals. Our Primary focus is to train in a wide range of areas from IT Technical, Personal Development, Human Resources and Management Courses to Project, Program and IT Service Management. We have most experienced trainers in the Industry. Our Trainers are highly skilled in their subject areas and are uniquely positioned to provide participants with deep industry experience. They are motivated to transfer knowledge through practical support post and pre-training to provide participants with additional support outside the classroom.

Brunel University London

brunel university london

Uxbridge

In 2016, Brunel celebrated 50 years as a university. However, our history can be traced back much further to 1798 through our predecessor colleges of Borough Road College, Maria Grey College, Shoreditch College and the West London Institute of Higher Education and as well as through Acton Technical College then Brunel College. Our rise since 1966 has been impressive and our reputation grows year on year. Now a university of 12,746 students – 3,309 students engaged in postgraduate and research study – our special approach is to combine academic rigour with the practical, entrepreneurial and imaginative approach pioneered by Isambard Kingdom Brunel. The decision to be named after Isambard Kingdom Brunel was taken after much discussion. Rather than name the new College after a location, Dr Topping, the first Vice Chancellor of Brunel University (and former Principal of Brunel College) pleaded that the name should be a well-known person preferably an engineer or scientist associated in some way with Middlesex or Acton. Agreement was reached in March 1957 that person would be Isambard Kingdom Brunel. Isambard Kingdom Brunel (1806-1859) is one of the great British engineers of the 19th century. Isambard was born into an industrious family in 1806, with his mother Sophia Kingdom working for the Royal Navy and father Marc Brunel being a prominent French engineer. Isambard took on formal training as an engineer and went on to build twenty-five railways lines, over a hundred bridges, including five suspension bridges, eight pier and dock systems, three ships and a pre-fabricated army field hospital.To add to this he was a keen social engineer, building housing estates, churches and hospitals. In order to learn more about Isambard Kingdom Brunel and his legacy, visit the following links: Bristol University Brunel Collection - IKB's letters, sketchbooks, etc Brunel200 - projects, competitions, debates, media programmes and talks to commemorate the 200th anniversary of the birth of Isambard Kingdom Brunel Museum of the Great Western Railway SS Great Britain - surviving in the dry dock that had been built specifically for her design and construction in Bristol There is also extensive Brunel information on the BBC's History pages