✨ Get 20% OFF your first order. ✨

Your Shopping Bag

Your bag is empty

Subtotal $0.00
Shipping Calculated at checkout
Continue Shopping

Durable Network Operations Specialist Training (network, Data, And Communications Security) Collection [rYxsPB9u]

$39.99 $127.99 -69%

Training Formats:      Instructor-Led, Self-PacedDuration:        5 DaysCourse Overview Having a solid defense-in-depth strategy for architecting and operating networked technology provides organizations with operational resilience from cyber-attacks

Secure Shopping

100% Safe Guarantee

Free Shipping

On orders over $30

Money-Back

30-Day Guarantee

Training Formats:      Instructor-Led, Self-Paced

Duration:        5 Days

Course Overview

Having a solid defense-in-depth strategy for architecting and operating networked technology provides organizations with operational resilience from cyber-attacks and data breaches. Students will learn key concepts about security architecture, network segmentation, defense in-depth, encryption technologies, and backup/replication sites, including cloud-based servers and services.

Activities/Labs:

 

  • Lab Environment Orientation
  • Creating Recommendations Based on Vulnerability Assessments
  • Sensitive Information Identification
  • Post Incident Service Restoration
  • Securing Linux for System Administrators
  • Cybersecurity Testing with Core Impact
  • Identify Whether High-Risk Systems Were Affected
  • Assess A High-Risk System
  • Vulnerability Identification and Remediation
  • Vulnerability Scan Analysis
  • Creation of Standard Operating Procedures for Recovery
  • Implement Single System Changes in Firewall
  • Secure Software Developer - Python Code Review
  • Identifying Malicious Network Connections
  • Identifying Intrusion and Mitigating Attacks with RHEL Server Capstone
  • Securing Linux - Firewalls
  • Setting Up Zones in a Firewall
  • Tweaking Firewall Rules for Detection
  • Rogue Device Identification and Blocking
  • Network Segmentation (FW/DMZ/WAN/LAN)
  • Auditing Service Accounts and Setting up Automated Log Collection
  • Firewall Setup and Configuration
  • Detect the Introduction of a Malicious Application
  • LNX101 - Setting Up a Firewall with UFW and Firewalled
  • IDS Setup and Configuration
  • Introduction to OWASP Top Ten: Capstone
  • Gap Analysis of Firewall Rules
  • Identify Access to a LINUX Firewall through SYSLOG Service
  • System Administrator Capstone (Auditing and Log Collection)
  • Baseline Systems in Accordance with Policy Documentation
  • Core Impact Web Application Penetration Testing
  • System Hardening
  • Windows System Hardening
  • Report Writing for Presentation to Management
  • Analysis and Recommendation Report
  • Log Correlation & Analysis to Identify Potential IOC
  • LNX101 - OpenSSH Installation, Configuration, and Hardening

What Our Customers Say

December 30, 2025

Absolutely no complaints!

It’s a very clever, very well-made tool.

- Fawn Y..

December 30, 2025

Absolutely no complaints!

This product is a solid home run.

- Gillian S..

December 30, 2025

Absolutely no complaints!

A great item that is very useful.

- Dyfed J..

Write a Review

You Might Also Like

Discover more great products from our collection.

Tool Aid 88050 Toe Dolly

Tool Aid 88050 Toe Dolly

(462)
$30.99 $99.99 -69%
Dupont  - Acrylic

Dupont - Acrylic

(202)
$57.99 $185.99 -69%
403-5748-02 MOUNT-RADIATOR

403-5748-02 MOUNT-RADIATOR

(533)
$16.99 $54.99 -69%
OTSO MERINOWOLLE MÜTZE

OTSO MERINOWOLLE MÜTZE

(933)
$16.99 $54.99 -69%

Copyright 2025 © mappa-mercia.org

VISA
PayPal
Stripe
Mastercard
CASH ON DELIVERY