Home / Training / Network Security

Network Security

Master network security, attack detection, and the implementation of effective countermeasures.

Objective

This training aims to review various attacks targeting network protocols and equipment. Demonstrations and practical exercises of attacks will be conducted, along with explanations of the countermeasures to be implemented. We will first study attacks targeting or exploiting Layer 2 protocols that take advantage of misconfigured switches. This will be followed by attacks targeting routers and VPN systems. Finally, we will focus on equipment that can enhance network security (firewalls, IDS/IPS, proxies, etc.).

Specific Objectives:

  • To fully understand vulnerabilities
  • To deploy robust configurations and apply best practices
  • To effectively protect users

Prerequisites

  • Solid knowledge of networking
  • Administration of network equipment

General Information

  • Code: SR
  • Duration: 3 days
  • Schedule: 8:30 AM - 5:30 PM
  • Location: Training Center, Centre Urbain Nord, Tunis

Target Audience

  • System/Network Administrators
  • Network/System Technicians
  • Network/System Engineers

Resources

  • Training materials
  • 40% demonstration
  • 40% theory
  • 20% practical exercises

Training Program

  • Day 1
    • Overview of network security challenges
    • Demonstration of attacks targeting Layer 2 equipment and their countermeasures
    • ARP
    • VLAN
    • CDP
    • Spanning Tree
    • etc.
  • Day 2
    • Attacks and protection of Layer 3 equipment and protocols
    • IPv4 and IPv6
    • RIP
    • OSPF
    • EIGRP
    • BGP
  • Day 3
    • Attacks and countermeasures on virtual gateways
    • VRRP
    • HSRP
    • GLBP
    • Attacks and countermeasures on VPNs
    • Securing network equipment at Layers 2 and 3
    • Network protection tools
    • Firewalls
    • IDS/IPS
    • Proxy services

Don't hesitate to contact our experts for additional information, free audit studies, and cost estimates.

Information security is essential for any organization that needs to protect and enhance its information assets.

Contact Us