In this intensive three-day seminar, attendees will review the basic operating characteristics and risks associated with LANs, WANs, client/server and other forms of networking and distributed computing architectures. We will survey best practices for securing and auditing network applications, interconnection devices, and remote access and perimeter security services. We will also map and organize the use of built-in and add-on tools to security policy and audit requirements to determine the essential topics that must be addressed in compliance and risk management, security administration standards and procedures and audit programs. You will receive security and audit checklists at the end of each control-related section.
This course is available on-site at your location, or offered through open enrollment 12/7/20 - 12/9/20.
- Defining the Distributed Information Technology Environment
- Developing a Reference Framework for Network Security and Audit: Network Standards and Protocols
- Demystifying Network Media Access Technologies: Local Area Networks (LANs) and Wide Area Networks (WANs)
- Network Interconnection Devices: Functionality, Management, and Security
- Enterprise Network Directory Services Security and Audit
- Keeping a Lid on Network Host Services Security
- Circling the Wagons: Network Perimeter Security
- Wrap-up: Performing a Network Security Risk Analysis