Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Networking Overview & Internet Architecture
- TCP/IP & OSI models, routing protocols (BGP, OSPF, EIGRP), DNS, DHCP, NAT
- Security implications: ARP spoofing, DNS tunneling, route hijacking, and DHCP starvation
- Network traffic analysis fundamentals & baseline establishment
- Lab 1:Packet capture analysis, topology mapping, and identification of suspicious routing/DNS behavior
Modern Network Solutions & Physical Implementation
- Software-Defined Networking (SDN), Network Function Virtualization (NFV), Zero Trust architecture
- Next-generation firewalls, micro-segmentation, and egress/ingress traffic controls
- Fiber optic infrastructure: optical security, physical layer tapping risks, and media attenuation monitoring
- Lab 2: Secure network segmentation design exercise with policy-driven access controls & physical media risk mapping
Virtualization, Cloud Computing & IaaS Security
- Hypervisor types (Type 1/2), VM escape vectors, hyperjacking, and hypervisor hardening
- Cloud IaaS security models (AWS/Azure/GCP), identity & access management, security groups, and compliance boundaries
- Shared responsibility framework, misconfiguration detection, and cloud-native encryption (at-rest/in-transit)
- Lab 3: Cloud security posture assessment, IAM role mapping, and detection of common IaaS vulnerabilities
Clustering, High Availability & IoT Security
- Load balancers, failover clusters, distributed consensus, and quorum risks
- IoT architecture, edge computing threats, firmware vulnerabilities, and protocol hardening (MQTT, CoAP, Zigbee, LoRaWAN)
- Device authentication, secure boot, and supply chain integrity for edge deployments
- Lab 4: Cluster failover simulation, IoT device enumeration, and secure provisioning workflow design
Cryptography, Web Service Security & Recent Vulnerabilities
- Symmetric/asymmetric encryption, key management, PKI, and certificate validation
- TLS/SSL handoffs, cipher suite hardening, and certificate pinning
- Web service security: OAuth2, JWT, API gateways, WAF rules, and rate limiting
- Recent cryptographic attacks & CVEs: side-channel exploits, quantum threats, ROCA, Heartbleed, and implementation flaws
- Lab 5: TLS configuration audit, API security testing, and vulnerability correlation exercise
Future Implementation, Risk Assessment & Capstone
- Emerging ICT trends: AI/ML in threat detection, SASE, 5G/6G network slicing risks, and edge-to-cloud convergence
- Risk assessment methodologies: NIST CSF, ISO 27001, threat modeling (STRIDE), and risk treatment planning
- Capstone: Design a secure, modern ICT architecture; conduct a risk assessment; and present mitigation strategies
- Course close, Q&A, and assessment preparation guidance
Requirements
Work experience in an IT or IT-related role
Basics of Network and internet
7 Hours