Course Summary
This course focuses on teaching practical tactics and tools for designing and implementing security infrastructure that enhances disruption prevention, early warning detection, and effective response to the most common cyberattacks. Drawing from the extensive experience of the instructors, who are seasoned cybersecurity professionals, the course emphasizes leveraging existing infrastructure—including switches, routers, next-gen firewalls, IDS, IPS, WAF, SIEM, sandboxes, encryption, PKI, and proxies—to strengthen security defenses.
You will learn how to assess, reconfigure, and validate these technologies to significantly improve your organization’s ability to prevent, detect, and respond to attacks. Additionally, the course covers innovative ways to enhance visibility, reduce attack surfaces, and proactively anticipate potential threats. Students will also explore the latest technologies, evaluating their strengths, capabilities, and limitations.
By the end of the course, you will be equipped with strategies for building a resilient security architecture, layer by layer, across hybrid environments, and moving towards a Zero Trust model. While not focused on monitoring, this course complements continuous security monitoring efforts, ensuring that your security architecture supports not only prevention but also provides essential data for behavioral detection and analytics systems, such as UEBA or SIEM, used in a Security Operations Center (SOC).
Cloud-based Security Architecture
Learn the concepts related to cloud security, securing on-premise hypervisors, network segmentation, surface reduction, delivery models, and container security.
Data Discovery, Governance, and Mobility Management
Learn about file classification, Data Loss Prevention (DLP), database governance, and Mobile Device Management (MDM).
Data-Centric Security
Learn the principles of data-centric security, including knowledge of reverse proxies, web application firewalls, database firewalls, and database activity monitoring.
Fundamental Layer 3 Defense
Learn how to secure basic Layer 3 hardware, protocols, and services, including an understanding of CIDR, Layer 3 routing attacks and mitigations, Layer 2/3 benchmarks and auditing tools, securing SNMP and NTP protocols, and bogon filtering.
Fundamental Security Architecture Concepts
Learn the basics of security architecture, including perimeter-focused deficiencies, the presumption of compromise, the Zero Trust Model, the Intrusion Kill Chain, Diamond Model, software-defined networking, micro-segmentation, threat vector analysis, and attack surface analysis.
IPv6
Learn the concepts of IPv6, including addressing, dual-stack systems, tunneling, and IPv6 router advertisement attacks and mitigation.
Layer 1/Layer 2 Defense
Learn how to secure Layer 1 and Layer 2 services, applications, and protocols, with awareness of attack vectors such as VLANs, CDP, MAC spoofing, ARP cache poisoning, DHCP starvation, VLAN hopping, 802.1X, and NAC.
Network Defenses
Learn network defense concepts such as NIDS, NIPS, network security monitoring, sandboxing, encryption, and DDoS protections.
Network Encryption and Remote Access
Learn how to secure remote access, including dual-factor authentication for all remote access VPNs and Jump Boxes.
Network Proxies and Firewalls
Learn the use of web proxies, SMTP proxies, and next-generation firewalls.
Zero Trust Endpoints
Learn the principles of securing Zero Trust Endpoints, including patching via automation, reducing end-user privileges, host hardening, host IDS/IPS, endpoint firewalls, and scaling endpoint log collection.
Zero Trust Fundamentals
Learn about Zero Trust Architecture, credential rotation, and how to respond to adversaries’ pivoting and insider threats.
Zero Trust Networking
Learn the concepts of Zero Trust Networking, including authenticating and encrypting endpoint traffic, Domain Isolation, Single Packet Authentication, red herring defenses, and proactive defenses to change attacker behaviors.
Other Popular Courses
CompTIA: SecurityX
- Duration: 5 Days
- Language: English
- Level: Advanced
- Exam: CAS-005
Executive Cyber Risk Certification (ECRC)
- Duration: 2 Days
- Language: English
- Level: Advanced
- Exam: ECRC
Mastering Communication & Presentation Te...
- Duration: 5 Days
- Language: Danish
- Level: Intermediate
- Exam: MCPT