Course details

Security information and security overview:

Network Concepts
TCP/IP Architecture
Common Network Protocols
Security Standards and Specifications
Information Security Standards and Specifications
ISO 27001 ISMS
Graded Protection of Information Security
Other Standards
Network Devices
Basic Network Devices
Initial Device Login
Defense and Information Security Development Trends
Security Threat Defense
Information Security Awareness
Information Security Development Trends
Information Security Threats
Current Situation of Information Security Threats
Threats to Network Security
Threats to Application Security
Threats to Data Transmission and Device Security
Concepts of Information Security
Information and Information Security
Information Security Risks and Management

Network Security Basis:

User Management
User Authentication and AAA Technical Principles
User Authentication Management and Application
of Intrusion Prevention
Intrusion Overview
Intrusion Prevention System Overview
Network Antivirus Overview
to Firewalls
Firewall Overview
Principle of Firewall Forwarding
Firewall Security Policies and Application
ASPF
Hot Standby
Technical Principles of Dual-System Hot Standby
Basic Networking and Configuration of Dual-System Hot Standby
Address Translation
NAT Principle
Source NAT
Server Mapping
Application Scenarios

Operation System and Host Security:

Firewalls and Antivirus Software
Windows Firewalls
Linux Firewalls
Antivirus Software
System Overview
Operating System 101
Windows Operating System
Linux Operating System
Server Types and Threats
Server Overview
Common Server Software
Server Security Threats
Vulnerabilities and Patches
Application of Encryption and Decryption
Key Infrastructure (PKI) Certificate System
Digital Certificate
PKI System Structure
PKI Implementation
of Cryptographic Technologies
Application of Cryptography
VPN Overview
VPN Configuration
and Decryption Mechanisms
Encryption Technology Development
Encryption and Decryption Mechanisms
Common Encryption and Decryption Algorithms
Security Operation and Analysis
Security Emergency Response
Background of Cyber Security Emergency Response
Overview of Cyber Security Emergency Response
Process of Cyber Security Emergency Response
to Security Operations
Concept of Security Operations
Basic Requirements for Security Operations
Content of Security Operations
Monitoring and Analysis
Proactive Analysis
Passive Collection
Data Analysis
Forensics
Cyber crime
Overview of Digital Forensics
Digital Forensic Process
Workshop
Discussion on Information Security Deployment Procedure
Discussion on Cyber Security Cases
  Updated on 20 July, 2020

Eligibility / Requirements

  1. Basic knowledge of TCP/IP.
  2. Basic knowledge of Routing and Switching.

About CLS Learn

Since 1995, CLS Learning solutions is leading the technology learning market in Egypt, the Middle East, and Africa. With our wide network of international partners, trainers, instructors, and technology leaders; we are able to deliver top notch training programs to our students and technology professionals.

25 Years in the market. 

We delivered over 4,200 courses to 63,500 professionals in our centers.

We delivered 1,200 courses to 18,240 corporate employees on Site.

See all CLS Learn courses
Courses you can instantly connect with... Do an online course on Networking and Security starting now. See all courses

Is this the right course for you?

Rate this page

Didn't find what you were looking for ?

or