Get in Touch

Course Outline

Networking Overview & Internet Architecture

  • TCP/IP & OSI models, routing protocols (BGP, OSPF, EIGRP), DNS, DHCP, NAT
  • Security implications: ARP spoofing, DNS tunneling, route hijacking, and DHCP starvation
  • Network traffic analysis fundamentals & baseline establishment
  • Lab 1:Packet capture analysis, topology mapping, and identification of suspicious routing/DNS behavior

Modern Network Solutions & Physical Implementation

  • Software-Defined Networking (SDN), Network Function Virtualization (NFV), Zero Trust architecture
  • Next-generation firewalls, micro-segmentation, and egress/ingress traffic controls
  • Fiber optic infrastructure: optical security, physical layer tapping risks, and media attenuation monitoring
  • Lab 2: Secure network segmentation design exercise with policy-driven access controls & physical media risk mapping

Virtualization, Cloud Computing & IaaS Security

  • Hypervisor types (Type 1/2), VM escape vectors, hyperjacking, and hypervisor hardening
  • Cloud IaaS security models (AWS/Azure/GCP), identity & access management, security groups, and compliance boundaries
  • Shared responsibility framework, misconfiguration detection, and cloud-native encryption (at-rest/in-transit)
  • Lab 3: Cloud security posture assessment, IAM role mapping, and detection of common IaaS vulnerabilities

Clustering, High Availability & IoT Security

  • Load balancers, failover clusters, distributed consensus, and quorum risks
  • IoT architecture, edge computing threats, firmware vulnerabilities, and protocol hardening (MQTT, CoAP, Zigbee, LoRaWAN)
  • Device authentication, secure boot, and supply chain integrity for edge deployments
  • Lab 4: Cluster failover simulation, IoT device enumeration, and secure provisioning workflow design

Cryptography, Web Service Security & Recent Vulnerabilities

  • Symmetric/asymmetric encryption, key management, PKI, and certificate validation
  • TLS/SSL handoffs, cipher suite hardening, and certificate pinning
  • Web service security: OAuth2, JWT, API gateways, WAF rules, and rate limiting
  • Recent cryptographic attacks & CVEs: side-channel exploits, quantum threats, ROCA, Heartbleed, and implementation flaws
  • Lab 5: TLS configuration audit, API security testing, and vulnerability correlation exercise

Future Implementation, Risk Assessment & Capstone

  • Emerging ICT trends: AI/ML in threat detection, SASE, 5G/6G network slicing risks, and edge-to-cloud convergence
  • Risk assessment methodologies: NIST CSF, ISO 27001, threat modeling (STRIDE), and risk treatment planning
  • Capstone: Design a secure, modern ICT architecture; conduct a risk assessment; and present mitigation strategies
  • Course close, Q&A, and assessment preparation guidance

Requirements

Work experience in an IT or IT-related role 

Basics of Network and internet 

 7 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories