PERIMETER SECURITY TECHNOLOGY

SUMMARY

A 5-day intensive course in which the different security technologies applied to the security of information within the network security perimeter of a company are described and developed.

AGENDA 

Design and architecture of perimeter security

• Design and definition of models for the establishment of the security perimeter. 

• Configuration of firewall filtering policies and rules. 

• Secure configuration of servers and services over the DMZ. 

• Proxy server configuration

• Secure communications to internal services through IPSEC connections. 

• Establishment of "encrypted" tunnels for connection between delegations (IPSEC tunnels). 

• Secure access via SSL to Web servers and mail servers. 

SECURITY IN WIRELESS NETWORKS

Configuration of wireless devices. 

• Access point. 

• Wireless cards. 

WPA2 authentication based on Radius. 

• Necessary elements. 

- RADIUS server.

- Active Directory. 

• Certificates. 

• PEAP authentication configuration

GENERAL INFORMATION

Advanced-level course

Mode: On-site and online training

Duration: 32 hours on-site mode / 2 months online mode

course categorie
course level