This Class Contains 60% Attacking and 40% Defending
In learning secure network architecture, you will be attacking and then defending an increasingly complex network each day in the class. On the first day you’ll start with both attacking and defending an environment with basic firewalling, and simple network segmentation. On the second day you’ll add VLANs, and network based IDS. On the third and fourth days you’ll add content filtering web proxies, reverse proxies, host–based IDS, WAFs, NAC, and a SIEM solution. Finally, on the fifth day will be an attack and defense based capture the flag event that incorporates all of the security solutions in place with multiple projectors in the room so each security system will be projected on the wall like a SOC environment.
Network Architecture Training in Maryland, Washington D.C. or Northern Virginia
Delivery Style: 80% Hands-On, 20% Lecture
Take a deep hands-on approach to in-depth network security architecture with this advanced class. This training course was written by Joe McCray and is designed for security professionals who live a life inside the Security Operation Center (SOC). This course is a compliment to the Cyber War class which is almost entirely offensive, this class combines offense and defense to make sure that the SOC tech knows how to defend the entire network from all threats. This class covers things like: Firewall, IDS, IPS, WAF, security event monitoring, intrusion analysis and more.
This is a 5 day, 40 clock hour course that counts towards security / IA related CEU's (40).
Secure Network Architecture Training Class Pricing: $2,995 Per Enrollment
Custom Training For Your Organization
If your organization needs something other than what we have listed here, no problem! Just fill out the request information form to the right and tell us more about your training needs, your ideal start-date, your location preference, your unique set of challenges and the expected outcome, and we will develop a customized training course proposal targeted to the specific needs of your staff within your scheduling constraints! We will gladly do this quickly and free of any obligation.
All Times Listed in Eastern Standard Time (EST)
For information related to scheduling, please fill out the information request form to the right.
News related to Network Architecture
- Hunting Cyber Threats with Big Data: Our Latest Webinar (2/21/2014)
- University of Maryland…Hacked and Exposed (2/20/2014)
- Security+ Practice Test (2/19/2014)