Goals
- Understand the security challenges of a computer network and know how to implement it
Program
Security issues
Risk assessment Security
criteria Security
related standards Business
continuity or recovery plans
Risk analysis and scenario development
Threat characterization (sources, vulnerabilities, objective)
Know how to make an inventory of characteristic threats
Risk-threat adequacy and availability
Practical workshop: development of a risk scenario, characterization of some common threats
Secure data, exchanges, and the network
Security of the operating system, reduction of the attack surface
Application
security Identity management
Audit a system
The issues of physical access
Identification of critical resources
Encrypt data
Security constraints: integrity, confidentiality, non-repudiation
Encryption principles, symmetric, asymmetric (private keys, shared secret, etc.)
Constraints linked to the support (espionage, wireless links, etc.)
Standard and extended permissions
Management of security profiles and application limitations
Using PAM
Setting up the firewall on Linux
Handling disk encryption on Linux
Managing intrusions and logs
Rights
management Service management
Problematic accesses for network and devices
Firewall configuration, and reflections
Encryption possibilities
Management of event log and audits
External analysis at network level
Inventory of operational risks
Verification of application and user partitioning
Risks related to system maintenance (software versions, bad configurations)
Targeted intrusion attempts
Duration
5 days
Price
£ 2148
Audience
Everyone
Prerequisites
Knowledge of network protocols
Reference
Re445-F
Sessions
Contact us for more informations about session date