user lock

Goals


- Understand the security challenges of a computer network and know how to implement it

Program

Security issues
Risk assessment Security
criteria Security
related standards Business
continuity or recovery plans

Risk analysis and scenario development
Threat characterization (sources, vulnerabilities, objective)
Know how to make an inventory of characteristic threats
Risk-threat adequacy and availability

Practical workshop: development of a risk scenario, characterization of some common threats

Secure data, exchanges, and the network
Security of the operating system, reduction of the attack surface
Application
security Identity management
Audit a system

The issues of physical access
Identification of critical resources
Encrypt data

Security constraints: integrity, confidentiality, non-repudiation
Encryption principles, symmetric, asymmetric (private keys, shared secret, etc.)
Constraints linked to the support (espionage, wireless links, etc.)

Standard and extended permissions
Management of security profiles and application limitations
Using PAM
Setting up the firewall on Linux
Handling disk encryption on Linux
Managing intrusions and logs

Rights
management Service management
Problematic accesses for network and devices
Firewall configuration, and reflections
Encryption possibilities
Management of event log and audits

External analysis at network level
Inventory of operational risks
Verification of application and user partitioning
Risks related to system maintenance (software versions, bad configurations)
Targeted intrusion attempts

Duration

5 days

Price

£ 2148

Audience

Everyone

Prerequisites

Knowledge of network protocols

Reference

Re445-F

Sessions

Contact us for more informations about session date