Tallinn University of Technology

Aim of the course:

This course introduces the core security concepts and skills needed for the installation, troubleshooting, and monitoring of network devices to maintain the integrity, confidentiality, and availability of enterprise data. It provides a theoretically rich, hands-on introduction to network security, in a logical sequence driven by technologies. Learners in this course are exposed to the foundational knowledge required to respond to network security threats through various threat mitigation measures. It targets students and individuals enrolled in technology degree programs at institutions of higher education and IT professionals who want to pursue a career in the network security field. After successfully completing this course, the student will receive a digital badge.

Target group:

Individuals who want to pursue a career in the network security field. Learners in this course are exposed to the foundational knowledge required to respond to network security threats through various threat mitigation measures.

Topics:

Course Outline
1 Securing Networks
2 Network Threats
3 Mitigating Threats
4 Secure Device Access
5 Assign Administrative Roles
6 Device Monitoring and Management
7 Authentication, Authorization and Accounting (AAA)
8 Access Control Lists
9 Firewall Technologies
10 Zone-Based Policy Firewalls
11 IPS Technologies
12 IPS Operation and Implementation
13 Endpoint Security
14 Layer 2 Security Considerations
15 Cryptographic Services
16 Basic Integrity and Authenticity
17 Public Key Cryptography
18 VPNs
19 Implement Site-to-Site IPsec VPNs with CLI
20 Introduction to the ASA
21 ASA Firewall Configuration
22 Network Security Testing

Study results:

Students who complete this course successfully will be able to perform the following functions:
Explain the various types of threats and attacks.
Explain the tools and procedures to mitigate the effects of malware and common network attacks.
Configure command authorization using privilege levels and role-based CLI.
Implement the secure management and monitoring of network devices.
Configure AAA to secure a network.
Implement ACLs to filter traffic and mitigate network attacks on a network.
Implement Zone-Based Policy Firewall using the CLI.
Explain how network-based Intrusion Prevention Systems are used to help secure a network.
Explain endpoint vulnerabilities and protection methods.
Implement security measures to mitigate Layer 2 attacks.
Explain how the types of encryption, hashes, and digital signatures work together to provide confidentiality, integrity, and authentication.
Explain how a public key infrastructure is used to ensure data confidentiality and provide authentication.
Configure a site-to-site IPsec VPN, with pre-shared key authentication, using the CLI.
Explain how the ASA operates as an advanced stateful firewall.
Implement an ASA firewall configuration.
Implement an ASA firewall configuration using ASDM (optional).
Test network security.

Language:

English

Volume:

contact study: 48 academic hours
autonomous/other study: 30 academic hours

EAP:

3

Graduation document:

TalTech tunnistus

Lector:

Mohammad Tariq Meeran, PhD

Contact:

Marika Tamm, 5145506, marika.tamm@taltech.ee

Price:

1600 € + VAT/participant

Registration deadline:

07.03.2024 23:59

Comment:

Koolitus toimub CISCO Webex Meetings keskkonnas. Vahetult enne kursuse algust jagatakse infot, kuidas keskkonda pääseda ja õige kursus leida.

Location:

webinars on Wednesdays @17:00-20:00 CISCO Webex Meetings keskkonnas

Location:

webinars on Wednesdays @17:00-20:00 CISCO Webex Meetings keskkonnas

Price:

1600 € + VAT/participant

Volume:

contact study:
48 academic hours
autonomous/other study:
30 academic hours

EAP:

3

Contact:

Marika Tamm, 5145506, marika.tamm@taltech.ee