Training & Certifications

This program provides participants with knowledge and skills that are essential for carrying out security responsibilities in their organization. The first few modules lay groundwork for specialized security topics that covered network operation and design, TCP/IP protocol suite, introduce Port Scanning and understand role that routers play also conclude several topics about physical security.

At the end of the training, participants will understand the fundamental of network security and perform FCNS certification exam.

At the end of the program, the participants will be able to :

  1. Possess the security threat and risk assessment skills
  2. Mitigate security risks and threats while designing a security solution
  3. Apply the technical know-how to mitigate technical control issues

Network Administrator, Systems Administrator, Network Engineer, Systems Engineer.

This program is 5 days of intensive training class.

Participants are required to have knowledge of Fundamental ICT, Networking Essentials, Computer Networking Technology or related subjects.

At the end of the program, the participants will be assessed with Foresec Certified in Networking Security Exam.

Foresec Certified in Networking Security Certification will be awarded upon successfully passing the exam from Foresec, through an independent online exam engine, PXmatics.

  1. Understanding and Identifying the Importance of Information Risks
  2. Risk Assessment Methodology
  3. Risk Mitigation Strategy
  4. Security Risk Management Documentation
  1. Traffic Ingress and Egress Filtration Basics
  2. Implementing Firewall using IPTABLES
  3. Firewall positioning and management
  4. Firewall Security Risk Assessment and Mitigation
  1. Implementing Common ACL and Extended ACL Features
  2. Implementing Cryptographic Controls
  3. Service Security and Hardening
  4. Router Security Risk Assessment and Mitigation
  1. Understanding Wireless Types and Implementation
  2. Demonstrating Security weaknesses in Wireless Technology
  3. Wireless Hardening Methods and Designing proper infrastructure
  4. Wireless Security Risk Assessment and Mitigation
  1. Information Security Architecture Design Principle
  2. Designing Access Control Mechanism
  3. Designing Cryptographic Control
  4. Designing Network Security
  5. Designing Application Security
  6. Secure Computing Topology
  1. Implementing Information Security Policies
  2. Mitigating Phishing Attacks
  3. Mobile Devices Vulnerabilities
  4. Advanced Persistent Threat Issues
  5. Malicious Hardware Threats
  1. Understanding Malware Threats
  2. Backdoor / Rootkits and Trojans Risks
  3. Malware Risks on Mobile Devices
  4. Understanding Crimeware
  5. Mitigation Malware Security Risks
  1. Responding to Network Attacks
  2. Responding to Unix/Linux System Compromise
  3. Responding to Windows System Attacks
  4. Developing an Efficient Incident Response Plan
  1. Types of Disgruntled Employee
  2. Understanding Corporate Cyber Embezzlement
  3. The Human Factor Risk Scenario
  4. Insider Attack Explained
  5. Mitigating Strategy and Detection of Insider Attacks
  1. Difference between IDS and IPS technology
  2. Implementing Snort as an IDS
  3. Implementing Snort as an IPS
  4. Maintaining a healthy Detection Systems
  5. Limitations of IDS and IPS technology
  1. How and What occurs in a DOS/DDOS attacks
  2. Detecting Denial of Service Attacks
  3. Behind the Botnet and Botherder motives and opportunity
  4. Utilising Cloud Security Solutions on Mitigation Strategy
  5. Real World Case Study
  1. Developing Vulnerability Management Program
  2. Tools of Trade on Vulnerability Assessment
  3. Red Box and Blue Box Vulnerability Testing Methodology
  4. Applying SECSDLC methodology in VA exercise
  5. Applying proper Vulnerability Management Practice
  1. Multi tenancy vs single tenancy hosting
  2. Auditing Cloud Infrastructure
  3. Assessing Risks of IAAS, SAAS and PAAS
  4. Cloud Security Standards and Best Practices
  5. Developing Appropriate SLA for Cloud Service Provider

Scroll to Top