Advance Network Defender (AND)- 5 days
About the course
With this course you can be among the few who transcend the old idea of the hacker having all the fun, take pride being the defender, form an offensive mindset to skilfully orchestrate robust and solid defense and reinvent popular belief by beating the hacker at his own game.
You will be evaluating advanced hacking methods of defense fortification bringing you closer to establishing perfect security best practices and methodologies you can apply to secure environments. This course provides segmentation and isolation to reduce the effectiveness of the advanced persistent threats.
CAST 614 will cover fundamental areas of fortifying your defense by discovering methods of developing a secure baseline and how to harden your enterprise architecture from the most advanced attacks. Once a strategy for a fortified perimeter is defined the course moves on to defending against the sophisticated malware that is on the rise today and the importance of live memory analysis and real time monitoring.
Why should you attend this course?
- Executing a set of techniques that are critical to the protection of your entire enterprise against some of today's most advanced threats
- Reviewing methods of system deployments in as secure a state as possible while supporting your daily business requirements
- Applying necessary techniques required for malware identification throughout the enterprise even in the case of the malware not being detectable by any of your security controls
- Staging Advanced Attacks to appreciate methods of correctly eliminating or mitigating risk to an acceptable level
Who should attend this course?
- Firewall administrators, system architects, system administrators, windows admin or those responsible for or interested in identifying security weaknesses in computer systems or networks
Table of Contents
- Advanced Filtering
- Firewall Configuration
- Hardening: Establishing a Secure Baseline
- Windows Server 2008 Security (Part I)
- Windows Server 2008 Security (Part II)
- Intrusion Detection and Prevention Why Intrusion Detection?
- Protecting Web Applications
- Memory Analysis
- Endpoint protection
- Securing Wireless