Doelstellingen

Learn how to secure your legacy, cloud and virtualized infrastructure.

Cyber incidents become more and more complex. Securing the use of Internet for communication and business starts with understanding known threats and security techniques, following the C-I-A triad philosophy: confidentiality, integrity and availability.

In this three-day course you learn the fundamentals of a secure virtualized enterprise infrastructure. We start from scratch and learn about essential threats, attacks and defences. Theory is illustrated with numerous demos of current security technologies and products.

Bestemd voor

This course is intended to anyone who doesn’t have any prior security knowledge and wants to understand all the essential key words and terminology. You do not need to be a “techie” to attend this course and to grasp all the IT security vitals. If you have already some security knowledge, this course might fill some gaps or clarify a few things.

Prerequisites: basic knowledge of IP networking and network elements.

"

Seeing that the trainer is an expert in his domain and is mastering everything teached during the class.

"
Maximilien Le Fevere, BPost

Programma

  • Essential security terminology and basic concepts
  • Crypto, hashing and PKI basics
  • Virtual Private Networks: SSL, TLS, SSH & OpenSSH, IPSEC concept and terminology, Site-to-Site configuration, ...
  • Network security: Internet Access Street (IAS) concepts, firewall overview and concepts, NAT, flows, proxy, SSL inspection and interception, UTM, Next-Generation Girewall, web application firewall, ...
  • Virtualization concepts & introduction to VMware ESXi & vSphere, ...
  • Firewall virtualization concept, advantages & deployments: CheckPoint Virtual Edition (vSEC) & VSX, micro-segmentation concepts, ...
  • Integrated Virtualization Services: traditional server security vs hypervisor security, example with Trend Micro Deep Security, VMware vShield, …
  • Introduction to SDN and essential firewalling
  • Availability: introduction and concepts, high availability, clustering concepts with Microsoft Server (FS, VM), firewall clustering, Distributed Denial of Service (DDoS) concepts, anti-DDoS with Arbor and F5, ...
  • End-point security and malware protection: sandboxing, hash filtering, threat extraction, Endpoint Detection and Response (EDR), CP Sandblast Agent, encrypted file systems with LUKS on Linux, ...
  • Sniffing, IDS/IDP: network sniffing and snarfing concepts, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IDP), Security Onion concept, ...
  • FIM - File Integrity Monitoring, with OSSEC
  • Introduction to incident response and forensics with Bluecoat Security Analytics. Introduction to SIEM, logging and intelligence: concepts, Arcsight, Splunk, OpenDNS, IBM Qradar, ...

Docent(en)

d_03761

Stijn Huyghe

Stijn Huyghe is operational with Proximus since 2001 and is a seasoned cyber security trainer providing and developing courses such as “Linux administration”, “Cyber Security Explored”, “Hacking Explained and Intrusion Detection (HEXID)” and others. He is able to translate technical knowledge into easy-to-understand explanations and demo’s towards a diverse audience. Besides that, he has fun maintaining some parts of the Proximus infrastructure and develops demo’s in the HEXID cyber range for internal and external customers.

Praktische informatie

Prijs: 1 872 EUR (excl btw)

De opleidingen komen in aanmerking voor verschillende subsidies. Handig: zo betaalt u zelf maar een deel van het inschrijvingsgeld.

  • Tot 40% subsidie met KMO portefeuille. Meer info vindt u hier.
Incompany: Hebben meerdere collega’s behoefte aan deze opleiding? En trekt u liever niet naar een andere plaats? Breng de opleiding naar uw afdeling of onderneming: handig! Bovendien spitst de trainer zich dan toe op uw situatie, op uw sector en op de vragen van uw medewerker. Vraag uw incompany opleiding aan.

Partner

Inschrijven

Data