top of page
Introduction to Network & Security.jpg

Speak with our Course Advisor

Introduction to Network
and Security

Course Price

RM 800

Duration: 02 days/16 hours

+

-

Systems and network security will continue to trust the Internet and networked systems to conduct business. In addition, cybercrime and security breaches compromise critical business functions and data. To mitigate security threats, protect sensitive data, and maintain business stamina, protecting computers and networks are critical. It also describes how to assess security from an attacker's perspective to more effectively execute Internet and system defenses.

+

-

Those who need basic skills to develop and implement security programs designed to protect their organization's information from threats.

+

-

The admission fee for this program is RM 800.

Duration: 02 days / 16 hours

+

-

- Physical Classroom Training (Malaysia)

- On-site Company Training (Malaysia)

- Online Training via Microsoft Team (Malaysia and International)

+

-

Basic Computer Knowledge.

+

-

The inquiry process comprises three simple steps.

STEP 1 Submit Inquiry- Tell us a bit about yourself and the questions you want to enquire

STEP 2 Reviewing–Your questions will be processed and answered within a day or two 

STEP 3 Response–Answers will typically be sent through email. However, you may tell us the option you prefer us to contact you in

+

-

Building a Secure Organization

​

  1. Real threats that impact cybersecurity

    1. Hackers inside and out

    2. Eavesdropping

    3. Spoofing

    4. Sniffing

    5. Trojan horses

    6. Viruses

    7. Wiretaps

  2. A cyber security policy: the foundation of your protection

    1. Defining your information assurance objectives

    2. Assessing your exposure

 

A Cryptography Primer

​

  1. Securing data with symmetric encryption

    1. Choosing your algorithm: DES, AES, Rc4 and others

    2. Assessing key length and key distribution

  2. Solving key distribution issues with asymmetric encryption

    1. Generating keys

    2. Encrypting with RSA

    3. PGP and GnuPG

    4. Evaluating Web of Trust and PKI

  3. Ensuring integrity with hashes

    1. Hashing with Md5 and SHA

    2. Protecting data in transit

    3. Building the digital signature

 

Guarding Against Network Intrusions

​

  1. Scanning for vulnerabilities

    1. Searching for rogue servers

    2. Profiling systems and services

  2. Reducing Denial of Service (DoS) attacks

    1. Securing DNS

    2. Limiting the impact of common attacks

  3. Deploying firewalls to control network traffic

    1. Preventing intrusions with filters

    2. Implementing a cyber security policy

    3. Deploying personal firewalls

  4. Protecting web services and applications

    1. Validating user input

    2. Controlling information leakage

 

Ensuring Network Confidentiality

  1. Threats from the LAN

    1. Sniffing the network

    2. Mitigating threats from connected hosts

    3. Partitioning the network to prevent data leakage

    4. Identifying wireless LAN vulnerabilities

  2. Confidentiality on external connections

    1. Ensuring confidentiality with encryption

    2. Securing communication with IPSec

Get Authenticated
certificate-img.webp

FAQ

What is the pre-requisites to take this course?

Beginners are welcome to join. Basic programming knowledge is recommended.

Do you provide support for this course?

Yes our trainers are there to support you during training and post training.

Can I request a refund if I am not happy with the training?

Yes, subject to our refund policies.  

WHY NEXPERTS ACADEMY

CERTIFIED-01.png

- CERTIFIED TRAINERS

RECORDING-01.png

- LIFETIME ACCESS TO
RECORDED SESSIONS

EXPERIENCE-01.png

- HIGHLY EXPERIENCED
WITH INTERVIEW PREPARATION

CALENDAR-01.png

- FLEXIBLE SCHEDULE

24 HRS-01.png

- 24/7 SUPPORT

ONE ON ONE-01.png

- ONE ON ONE ASSISTANCE

bottom of page