Cocok Banget Sama Kamu
Student
Fresh Graduate
Profesional

Network Defense Essentials

Biaya :

  • Rp 850.000 (mahasiswa)
  • On Call (umum professional/non professional)

 

Informasi tambahan:

  • Pelatihan dilaksanakan secara Daring (online)
  • Materi dapat diakses secara self-learning setelah pendaftaran.
  • Mendapat fasilitas latihan persiapan ujian bersama tutor hingga 4 sesi secara daring (Online).

Materi Yang Akan Kamu Dapetin

Anda akan mempelajari berbagai keterampilan penting di bidang keamanan jaringan, termasuk cara mengidentifikasi masalah utama yang mengancam keamanan jaringan dan memahami protokol keamanan yang penting. Anda juga akan mendalami konsep autentikasi, otorisasi, dan kontrol keamanan jaringan, seperti kontrol administratif (kerangka kerja, hukum, dan kebijakan), kontrol fisik (keamanan fisik dan lingkungan), serta kontrol teknis (firewall, VPN, IDS/IPS, dan lainnya). Selain itu, Anda akan mempelajari dasar-dasar virtualisasi, komputasi awan, dan keamanan cloud, serta pengamanan jaringan nirkabel, perangkat seluler, dan IoT. Topik lainnya meliputi kriptografi dan PKI, perlindungan data melalui enkripsi dan teknik pencegahan kehilangan data, serta pemantauan lalu lintas jaringan untuk mendeteksi aktivitas mencurigakan.

Kurikulum

Topics Covered:

  • Fundamentals of Network Security
  • Network Security Protocols

Topics Covered:

  • Access Control Principles, Terminologies, and Models
  • Identity and Access Management (IAM) Concepts

Lab Exercise:

  • Implementing Access Controls in Windows Machine
  • Managing Access Controls in Linux Machine
  • Implementing Role-Based Access Control in Windows Admin Center (WAC)

Topics Covered:

  • Regulatory Frameworks, Laws, and Acts
  • Design and Develop Security Policies
  • Conduct Different Types of Security and Awareness Training

Lab Exercise:

  • Implementing Password Policies Using Windows Group Policy

Topics Covered:

  • Importance of Physical Security
  • Physical Security Controls
  • Workplace Security
  • Environmental Controls

Topics Covered:

  • Types of Network Segmentation
  • Types of Firewalls and their Role
  • Types of IDS/IPS and their Role
  • Types of Honeypots
  • Types of Proxy Servers and their Benefits
  • Fundamentals of VPN and its Importance in Network Security
  • Security Incident and Event Management (SIEM)
  • User Behavior Analytics (UBA)
  • Antivirus/Anti-malware Software

Lab Exercise:

  • Implementing Host-Based Firewall Protection with iptables
  • Implementing Host-Based Firewall Functionality Using Windows Firewall
  • Blocking Unwanted Website Access using pfSense Firewall
  • Implementing IDS functionality Using Wazuh HIDS and Suricata IDS
  • Establishing Virtual Private Network Connection Using SoftEther VPN

Topics Covered:

  • Virtualization Essential Concepts and OS
  • Virtualization Security
  • Cloud Computing Fundamentals
  • Cloud Security and Best Practices

Lab Exercise:

  • Auditing Docker Host Security Using Docker-Bench-Security Tool
  • Implementing AWS Identity and Access Management
  • Securing Amazon Web Services Storage

Topics Covered:

  • Wireless Network Fundamentals
  • Wireless Network Encryption Mechanisms
  • Types of Wireless Network Authentication Methods
  • Implement Wireless Network Security Measures

Lab Exercise:

  • Configuring Security on a Wireless Router

Topics Covered:

  • Mobile Device Connection Methods
  • Mobile Device Management Concepts
  • Common Mobile Usage Policies in Enterprises
  • Security Risks and Guidelines Associated with Enterprises Mobile Usage Policies
  • Implement Enterprise-level Mobile Security Management Solutions

Lab Exercise:

  • Implementing Enterprise Mobile Security Using Miradore MDM Solution

Topics Covered:

  • IoT devices, application areas, and communication models.
  • Security in IoT-enabled environments.

Lab Exercise:

  • Securing IoT device communication using TLS/SSL.

Topics Covered:

  • Cryptographic techniques.
  • Cryptographic algorithms.
  • Cryptography tools.
  • Public Key Infrastructure (PKI).

Lab Exercise:

  • Calculating one-way hashes using HashCalc.
  • Calculating MD5 hashes using HashMyFiles.
  • Creating a self-signed certificate.

Topics Covered:

  • Data security and its importance.
  • Security controls for data encryption.
  • Data backup and retention policies.
  • Data loss prevention concepts.

Lab Exercise:

  • Performing disk encryption using VeraCrypt.
  • File recovery using EaseUS Data Recovery Wizard.
  • Backing up and restoring data in Windows.

Topics Covered:

  • The need for and advantages of network traffic monitoring.
  • Determining baseline traffic patterns for normal and suspicious network traffic.
  • Performing network monitoring for suspicious traffic.

Lab Exercise:

  • Capturing network traffic using Wireshark.
  • Applying various filters in Wireshark.
  • Analyzing and examining various network packet headers in Linux using tcpdump.

Fasilitator

Verified by MonsterInsights