Basic knowledge of IT and networks is recommended, but no specific prior knowledge of IT security is required.
In this course, participants will learnr how to implement and operate technical measures to secure networks. The focus is on the practical application of firewalling, intrusion detection systems (IDS), intrusion prevention systems (IPS) and the analysis of network protocols.
By introducing the creation and customization of rules, participants can identify and defend against threats at an early stage. The course is aimed at participants with solid Linux knowledge who want to expand their skills in the area of network security.
The course concludes with a certificate exam.
After completing the course, participants will be able to:
To effectively secure networks with firewalls.
analyze network traffic and identify suspicious activities.
To configure IDS and IPS solutions and adapt them to individual needs.
Create and apply YARA rules to detect malware and suspicious behavior.
protect web applications from attacks
This course is aimed at:
IT administrators and security officers who want to better protect their networks.
Network engineer with experience in Linux administration.
Cyber security enthusiasts who want to deepen their knowledge of threat defense.
Introduction to Network Security:
Overview of threats and attack scenarios.
Basics of network security.
Firewalling:
Basic and advanced filter rules.
Stateful vs. stateless packet filtering.
protocol analysis and traffic monitoring:
Analyzing network traffic with Wireshark and tcpdump.
Detecting suspicious patterns to create IDS rules.
Intrusion Detection System (IDS):
Functionality and configuration of an IDS.
Create custom rules based on network observations.
Intrusion Prevention System (IPS):
Differences between IDS and IPS.
Configuring and deploying an IPS for automatic blocking.
Web Application Firewall (WAF)
Protecting web applications.
Creation and customization of WAF rules.
YARA rules for malware detection:
Introduction to YARA and its integration into security platforms.
Creating and customizing YARA rules to detect suspicious files.
Examination:
Analysis of a simulated attack
Configuration of measures to protect your own services
6,5 days, 8 hours per day
The course includes both theoretical units and practical exercises in a laboratory environment. Participants learn to identify and fix real-world vulnerabilities by analyzing and fixing various configuration errors.
Basic knowledge of IT and networks is recommended, but no specific prior knowledge of IT security is required.
Patrick Raeschke
Phone: +49 (0) 261 450 930 90
info@prosec-networks.com
Find the right Ethical Hacker Course for your next career step
We use cookies, and Google reCAPTCHA, which loads Google Fonts and communicates with Google servers. By continuing to use our website, you agree to the use of cookies and our privacy policy.