Speak to our team now +44 (0)1737 821590

IP security foundation for engineers

A 2 day
training course
**Due to the current COVID-19 isolation rules all our courses are being delivered via virtual instructor led learning until further notice**

IP security training course description

Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls.

Key outcomes from this course

By the end of the course delegates will be able to:
  • Describe
    • Basic security attacks
    • RADIUS
    • SSL
    • IPSec
    • VPNs
  • Implement digital certificates
  • Deploy firewalls to protect Web servers and users.
  • Secure Web servers and clients.

IP security training course details

Who will benefit:
Network administrators.
Network operators.
Security auditors.
TCP/IP foundation for engineers
2 days

Training approach

This structured training course seeks to build upon workbook learning through the use of group exercises, dynamic discussion and individual tasks in order to deliver an engaging and interactive module that will ensure all candidates are able to transfer their new skills into the workplace.

Overall ratings for this course:

Course review

"A good intro to a complex subject."
H. D. SP Energy Networks
"Course was a real eye-opener to some of the barriers we encounter. "
T. E. FP Mailing

IP security training course contents

TCP/IP review
Brief overview of the relevant headers.
Exercise: Download software for course, use analyser to capture passwords on the wire.

Security review
Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response.

Security exploits
The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death…, keeping up to date with new threats.
Exercise: Use a port scanning tool, use a “hacking” tool.

Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses.
Exercise: Set up a firewall and prevent attacks.

NAT and PAT, Why use NAT, NAT-ALG, RSIP.

Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures.
Exercise: Run a password cracking program.

Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS.
Exercise: Using certificates.

Web client and server security
Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts. Exercise: Browser security.

VPNs and IPSec
What is a VPN, tunnelling, L2F, PPTP, L2TP,IPSec, AH, ESP, transport mode, tunnel mode.

Why Choose Us

SNT trainers score an average of over 90% on the three main areas of:
  • Ability to teach
  • Technical knowledge
  • Answering questions
“Excellently presented by a very knowledgeable and enthusiastic trainer.” P.D. General Dynamics

We limit our maximum class size to 8 delegates; often we have less than this. This ensures optimal interactivity between delegates and instructor.
"Excellent course. The small class size was a great benefit…" M.B. IBM

We write our own courses; courseware does not just consist of slides and our slides are diagrams not bullet point text. A typical chapter provides clearly defined objectives with a chapter overview, slides with text underneath, a quiz at the end to check the learning of the students. Hands on exercises are at the end and are used to reinforce the theory.

See Dates & Prices for this course

To enquire about this course

To reserve this course online