Course Summary

This course focuses on teaching practical tactics and tools for designing and implementing security infrastructure that enhances disruption prevention, early warning detection, and effective response to the most common cyberattacks. Drawing from the extensive experience of the instructors, who are seasoned cybersecurity professionals, the course emphasizes leveraging existing infrastructure—including switches, routers, next-gen firewalls, IDS, IPS, WAF, SIEM, sandboxes, encryption, PKI, and proxies—to strengthen security defenses.

You will learn how to assess, reconfigure, and validate these technologies to significantly improve your organization’s ability to prevent, detect, and respond to attacks. Additionally, the course covers innovative ways to enhance visibility, reduce attack surfaces, and proactively anticipate potential threats. Students will also explore the latest technologies, evaluating their strengths, capabilities, and limitations.

By the end of the course, you will be equipped with strategies for building a resilient security architecture, layer by layer, across hybrid environments, and moving towards a Zero Trust model. While not focused on monitoring, this course complements continuous security monitoring efforts, ensuring that your security architecture supports not only prevention but also provides essential data for behavioral detection and analytics systems, such as UEBA or SIEM, used in a Security Operations Center (SOC).

Cloud-based Security Architecture
Learn the concepts related to cloud security, securing on-premise hypervisors, network segmentation, surface reduction, delivery models, and container security.

Data Discovery, Governance, and Mobility Management
Learn about file classification, Data Loss Prevention (DLP), database governance, and Mobile Device Management (MDM).

Data-Centric Security
Learn the principles of data-centric security, including knowledge of reverse proxies, web application firewalls, database firewalls, and database activity monitoring.

Fundamental Layer 3 Defense
Learn how to secure basic Layer 3 hardware, protocols, and services, including an understanding of CIDR, Layer 3 routing attacks and mitigations, Layer 2/3 benchmarks and auditing tools, securing SNMP and NTP protocols, and bogon filtering.

Fundamental Security Architecture Concepts
Learn the basics of security architecture, including perimeter-focused deficiencies, the presumption of compromise, the Zero Trust Model, the Intrusion Kill Chain, Diamond Model, software-defined networking, micro-segmentation, threat vector analysis, and attack surface analysis.

IPv6
Learn the concepts of IPv6, including addressing, dual-stack systems, tunneling, and IPv6 router advertisement attacks and mitigation.

Layer 1/Layer 2 Defense
Learn how to secure Layer 1 and Layer 2 services, applications, and protocols, with awareness of attack vectors such as VLANs, CDP, MAC spoofing, ARP cache poisoning, DHCP starvation, VLAN hopping, 802.1X, and NAC.

Network Defenses
Learn network defense concepts such as NIDS, NIPS, network security monitoring, sandboxing, encryption, and DDoS protections.

Network Encryption and Remote Access
Learn how to secure remote access, including dual-factor authentication for all remote access VPNs and Jump Boxes.

Network Proxies and Firewalls
Learn the use of web proxies, SMTP proxies, and next-generation firewalls.

Zero Trust Endpoints
Learn the principles of securing Zero Trust Endpoints, including patching via automation, reducing end-user privileges, host hardening, host IDS/IPS, endpoint firewalls, and scaling endpoint log collection.

Zero Trust Fundamentals
Learn about Zero Trust Architecture, credential rotation, and how to respond to adversaries’ pivoting and insider threats.

Zero Trust Networking
Learn the concepts of Zero Trust Networking, including authenticating and encrypting endpoint traffic, Domain Isolation, Single Packet Authentication, red herring defenses, and proactive defenses to change attacker behaviors.

There are no formal prerequisites for this course. However, it is recommended that you have experience and knowledge in the following areas: Applying network-centric and data-centric security strategies to design a layered defense Assessing and improving existing technology

proctored exam 75 questions 2 hours Minimum passing score of 63%

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?