×
Phoenix TS

Cyber Safety Training

Over 4-days explore the technical security skills and knowledge applied to firewalls, ant-virus software, IDS, networking, and web security for enterprises.

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Course Overview

Our 4-day, instructor-led Cyber Safety training course explores the technical security skills and knowledge applied to IT security for enterprises.
This training will teach students:

  • How to understand varied aspects of security, including security objectives and policies
  • Prevention and identification techniques for potential vulnerabilities and/or threats to the enterprise
  • Necessary technical tool for organizational security and cyber safety
  • How to defend against common cyber and social engineering attacks, improve network security
  • Comparative analysis of security technologies, appliances, and applications

There are no prerequisites for this course. However, an understanding of the best security practices and experience installing/managing or maintaining enterprise security is recommended.

Schedule

Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 301-258-8200.

[image]

Not seeing a good fit?

Let us know. Our team of instructional designers, curriculum developers, and subject matter experts can create a custom course for you.

Contact Us

Learn more about custom training

Course Outline

Establishing Security Objectives

  • Defining security principles
  • Developing security principles

Secure Firewall Deployment

  • Firewall installation
  • Firewall configuration and outgoing services
  • External services security
  • Permitting access to internal services

Intrusion Detection and Protection

  • IDS deployment
  • Intrusion detection in the enterprise
  • Alert interpretation
  • Halting intruders

Remote User Virtual Private Networks (VPNs) Configuration

  • Constructing VPN tunnels
  • Client software deployment
  • Site-to-site VPNs
  • Cryptographic protection application
  • Tunneling vs protection methods

Perimeter Defense Integration

  • Denial-of-service (DoS) impact reduction
  • Perimeter architectures

Cyber Safety Training FAQs

Who should take the Cyber Safety course?

Security Analysts
Firewall Administrators
Systems and Network Administrators

What do students say about the Cyber Safety training course?

“I really enjoyed the class, learned good concepts. And the instructor was very professional and knowledgeable, explained everything very clear.” Student from July 2019

“Great class!” Student from March 2019

“The instructor’s experience played a great role in [their] ability to share real world examples of the applied science. This is always a bonus.” Student from March 2019

BONUS! Cyber Phoenix Subscription Included: All Phoenix TS students receive complimentary ninety (90) day access to the Cyber Phoenix learning platform, which hosts hundreds of expert asynchronous training courses in Cybersecurity, IT, Soft Skills, and Management and more!

Phoenix TS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints re-garding registered sponsors may be submitted to the National Registry of CPE Sponsors through its web site: www.nasbaregistry.org

Subscribe now

Get new class alerts, promotions, and blog posts

Phoenix TS needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

Download Course Brochure

Enter your information below to download this brochure!

Name(Required)