PERIMETER SECURITY TECHNOLOGY
SUMMARY
A 5-day intensive course in which the different security technologies applied to the security of information within the network security perimeter of a company are described and developed.
AGENDA
Design and architecture of perimeter security
• Design and definition of models for the establishment of the security perimeter.
• Configuration of firewall filtering policies and rules.
• Secure configuration of servers and services over the DMZ.
• Proxy server configuration
• Secure communications to internal services through IPSEC connections.
• Establishment of "encrypted" tunnels for connection between delegations (IPSEC tunnels).
• Secure access via SSL to Web servers and mail servers.
SECURITY IN WIRELESS NETWORKS
Configuration of wireless devices.
• Access point.
• Wireless cards.
WPA2 authentication based on Radius.
• Necessary elements.
- RADIUS server.
- Active Directory.
• Certificates.
• PEAP authentication configuration
GENERAL INFORMATION
Advanced-level course
Mode: On-site and online training
Duration: 32 hours on-site mode / 2 months online mode