Securing Wireless Networks and WANs Online Training

  • Time

    10:00am - 3:00pm

  • End Date

    12 Jul, 2022 - 14 Jul, 2022

  • Price

    ₦200,000

Event Details

This workshop is intended for individuals who perform a security role. It validates participants’ ability to effectively demonstrate knowledge about securing the wireless networks and WANs. Participants will typically have understanding of specialized data classifications and data protection mechanisms; of data-encryption methods and mechanisms to implement them; understanding of security operations and risks. They’ll also gain a working knowledge of secure Internet protocols and mechanisms to implement them; security services and features of services to provide a secure production environment. Finally, participants will learn the ability to make tradeoff decisions with regard to cost, security, and deployment complexity given a set of application requirements.

CONTENT

Incident Response

  • Evaluate the suspected compromised instance or exposed access keys.
  • Verify that the Incident Response plan includes relevant services.
  • Evaluate the configuration of automated alerting, and execute possible remediation of security-related incidents and emerging issues.

Logging and Monitoring

  • Design and implement security monitoring and alerting.
  • Troubleshoot security monitoring and alerting.
  • Design and implement a logging solution.
  • Troubleshoot logging solutions.

Infrastructure Security

  • Design edge security on WAN.
  • Design and implement a secure network infrastructure.
  • Troubleshoot a secure network infrastructure.
  • Design and implement host-based security.

Identity and Access Management

  • Design and implement a scalable authorization and authentication system to access network resources.
  • Troubleshoot an authorization and authentication system to access network resources.

Data Protection

  • Design and implement key management and use.
  • Troubleshoot key management.
  • Design and implement a data encryption solution for data at rest and data in transit.

 

FOR WHOM:

CIOs, IT Development Managers, Heads of Department, System Administrators/Engineers, IT Professionals and others who want to sharpen their knowledge in IT world.

 

TRAINING METHODOLOGY

The training methodology combines lectures, discussions, group exercises and illustrations. Participants will gain both theoretical and practical knowledge of the topics. The emphasis is on the practical application of the topics and as a result participant will go back to the workplace with both the ability and the confidence to apply the techniques learned to their duties.

 

DATE:

1ST BATCH: 17th – 19th Jan, 2022

2ND BATCH: 12th – 14th July, 2022

Other Dates

Start Date End Date
14 May, 2019 17 May, 2019
Start Date End Date
10 Sep, 2019 13 Sep, 2019
Start Date End Date
29 Jan, 2019 01 Feb, 2019
Start Date End Date
12 Jul, 2022 14 Jul, 2022

Share this course