Countering hacker attacks
Course ID : UEC-012
Duration In-class (в days) : 5 days
Duration Online : 5 days
Сurriculum : in-class, Virtual Instructor-Led Training - ONLINE
Overview
The course is devoted to technical means of ensuring information security. The main types of attacks, methods of protection against them, the choice of software and hardware solutions in the field of information security are considered.
Much attention is paid to practical work.
Audience for this course
The course is intended for specialists of information security departments and information technology services responsible for data protection.
Objective
Students will acquire knowledge and practical skills in ensuring the information security of modern IT infrastructure and applications, learn to identify typical attacks and counteract them.
Prerequisites for this course
Basic Windows and Linux OS administration skills. Basic knowledge of network technologies.
Outcomes
Upon completion of the course, students will gain the knowledge and skills to:
- Choose the best technical means of protecting the network infrastructure, server workstations and applications
- Understand the tactics and methods of action of violators and counteract them
- Detect attacks and mitigate their consequences
- Ensure security when working remotely and prevent information leaks
- Protect modern IT infrastructures using containers, microservices, and virtualization technologies
Outline
- Network attacks and defense strategies
- Administrative Security Measures
- Technical security measures
- Network perimeter security
- Windows Host Security
- Linux Host Security
- Mobile security
- Security of IoT devices
- Application Security
- Data security
- Virtual network protection technologies
- Cloud computing security
- WiFi. Wireless security
- Monitoring and analysis of network traffic
- Monitoring and analysis of network logs
- Incident Response Management
- Business continuity and disaster recovery
- Management of risks
- Threat definition and attack surface analysis
- Cyber Threat Analysis
- Final certification work