Course
Cyber Security – Implement Network and System Security («P3S»)
Course facts
- Understanding the current attack scenarios on networks and systems
- Learning about current attacks from LAB simulations
- Updating your own knowledge with sound sources
- Recommending current cyber security measures to protect the network and systems
- Understanding practical tools for implementation
1 Practical use of the course materials
- Presentation of the practice-oriented implementation concept
- Integration of the BSI IT-Grundschutz into the security considerations
2 Latest Cyber Threats
- From non-targeted attack to APT
- Threat overview and useful sources of information
- Malware and its defense today
- Overview of useful measures against Ransomware (Kryptotrojaner)
3 Fundamentals of Cryptography
- Overview symmetric and asymmetric cryptography
- Basics of Public Key Infrastructures
4 System security measures
- System Hardening Overview
- Malware defense through application whitelisting and exploit protection
- Defense against targeted physical attacks (HID,BAD-USB,..)
5 Network security measures
- Basics of VPN technologies (IPSec, L2TP and SSL/TLS)
- Email Encryption Basics
- Basics of WLAN security (attacks on WLANs)
- Basics of perimeter security (firewalling)
6 Access control
- Basics of Identification, Authentication and Authorization
- Use of secure passwords (attacks on passwords)
- Use of two factor solutions
- Basics of Access Control Models (DAC, MAC and RBAC)
7 Control and monitoring
- Security and vulnerability scanning
- Interpret vulnerabilities (CVE databases)
- Basics of using IDS/IDP solutions (detecting attacks)
Component of the following courses
This practice-oriented course is intended to enable information security managers, information system architects, administrators, system engineers, developers, project managers and IT managers to implement network and system security.
Experience in projects and in the daily use of information technologies, IT systems and networks. Basic knowledge of information security, analogous to the following course, is also required:
The protection of the network and the systems connected to it is one of the current challenges of every security professional. This course provides you with the necessary tools for this essential task. This is the last of three courses («P1S», «P2S», «P3S») in preparation for the international certification as a «CompTIA Security+ Professional». This course can also be attended without taking a certification.
RDP info
Participants must have a remote desktop client installed on their PC/notebook.
- Under Windows, the official Microsoft client is usually already installed
- macOS users can download the official Microsoft client from the Apple App Store: https://apps.apple.com/ch/app/microsoft-remote-desktop/id1295203466
Important: For security reasons, companies often block a remote desktop connection on business devices and in the company network. It is recommended to participate in the training on a private device and not on the company network. Alternatively, you can clarify in advance with the responsible IT department whether remote desktop connections are possible.