Network Defender (SF) - ITEL

Network Defender (SF)

Cybersecurity

Clientele

Network Defender (SF)

Course Overview

This 5-day instructor-led course focuses on training Network Administrators to protect, detect, and respond to network threats. Learners will gain a fundamental understanding of data transfer, network and software technologies, and how networks operate. The course covers network defense fundamentals, security controls, protocols, perimeter appliances, IDS, VPN and firewall configuration, network traffic analysis, and vulnerability scanning.

Learning Outcomes

Who Should Attend?

  • Information Security Analyst/Administrator
  • Information Assurance (IA) Security Officer
  • Information Security Manager/Specialist
  • Information Systems Security Engineer/Manager
  • Information Professionals/Officers
  • Information Security and IT Auditors
  • Risk/Threat/Vulnerability Analyst
  • System Administrators
  • Network Administrators and Engineers
  • Anyone who is concerned about the integrity of the network infrastructure

Course Prerequisite

Participants who wish to take up Network Defender (SF) should have experience and educational background on information security.

Potential Roles

Network Administrator, Network Security Administrator, Network Engineer, Security Analyst, Network Security Engineer, Network Security Analyst, Cybersecurity Engineer

Course Outline

Lesson 1: Network Attacks and Defense Strategies
  • Explain essential terminologies related to network security attacks
  • Describe various network-level attack techniques
  • Describe various application-level attack techniques
  • Describe various social engineering attack techniques
  • Describe various email attack techniques
  • Describe various mobile device-specific attack techniques
  • Describe various cloud-specific attack techniques
  • Describe various wireless network-specific attack techniques
  • Describe attackers’ hacking methodologies and frameworks
  • Understand the fundamental goals, benefits, and challenges of network defense
  • Explain the continual/adaptive security strategy
  • Explain the defense-in-depth security strategy
Lesson 2: Administrative Network Security
  • Learn to obtain compliance with regulatory frameworks and standards
  • Discuss various regulatory frameworks, laws, and acts
  • Learn to design and develop security policies
  • Learn to conduct different types of security and awareness training
  • Learn to implement other administrative security measures
Lesson 3: Technical Network Security
  • Discuss access control principles, terminologies, and models
  • Redefine access control in today’s distributed and mobile computing world
  • Discuss Identity and Access Management (IAM)
  • Discuss cryptographic security techniques
  • Discuss various cryptographic algorithms
  • Discuss the security benefits of network segmentation techniques
  • Discuss various essential network security solutions
  • Discuss various essential network security protocols
Lesson 4: Network Perimeter Security
  • Understand firewall security concerns, capabilities, and limitations
  • Understand different types of firewall technologies and their usage
  • Understand firewall topologies and their usage
  • Distinguish between hardware, software, host, network, internal, and external firewalls
  • Select firewalls based on their deep traffic inspection capabilities
  • Discuss the firewall implementation and deployment process
  • Discuss recommendations and best practices for secure firewall implementation and deployment
  • Discuss firewall administration concepts
  • Understand the role, capabilities, limitations, and concerns in IDS deployment
  • Discuss IDS classification
  • Discuss various components of IDS
  • Discuss the effective deployment of network and host-based IDS
  • Learn how to deal with false positive and false negative IDS/IPS alerts
  • Discuss considerations for selecting appropriate IDS/IPS solutions
  • Discuss various NIDS and HIDS solutions with their intrusion detection capabilities
  • Discuss Snort
  • Discuss router and switch security measures, recommendations, and best practices
  • Leverage Zero Trust Model security using Software-Defined Perimeter (SDP)
Lesson 5: Endpoint Security – Windows Systems
  • Understand Windows OS and security concerns
  • Discuss Windows security components
  • Discuss various Windows security features
  • Discuss Windows security baseline configurations
  • Discuss Windows user account and password management
  • Discuss Windows patch management
  • Discuss user access management
  • Explore Windows OS security hardening techniques
  • Discuss Windows Active Directory security best practices
  • Discuss Windows network services and protocol security
Lesson 6: Endpoint Security – Linux Systems
  • Understand Linux OS and security concerns
  • Discuss Linux installation and patching
  • Discuss Linux OS hardening techniques
  • Discuss Linux user access and password management
  • Discuss Linux network security and remote access
  • Discuss various Linux security tools and frameworks
Lesson 7: Endpoint Security – Mobile Devices
  • Understand common mobile usage policies in enterprises
  • Discuss security risks and guidelines associated with enterprise mobile usage policies
  • Discuss and implement various enterprise-level mobile security management solutions
  • Discuss and implement general security guidelines and best practices for mobile platforms
  • Discuss security guidelines and tools for Android devices
  • Discuss security guidelines and tools for iOS devices
Lesson 8: Endpoint Security – IoT Devices
  • Understand IoT devices, their needs, and application areas
  • Understand the IoT ecosystem and communication models
  • Understand security challenges and risks associated with IoT-enabled environments
  • Discuss security in IoT-enabled environments
  • Discuss security measures for IoT-enabled IT environments
  • Discuss IoT security tools and best practices
  • Discuss and refer to various standards, initiatives, and efforts for IoT security
Lesson 9: Administrative Application Security
  • Discuss and implement application whitelisting and blacklisting
  • Discuss and implement application sandboxing
  • Discuss and implement application patch management
  • Discuss and implement Web Application Firewalls (WAF)
Lesson 10: Data Security
  • Understand data security and its importance
  • Discuss the implementation of data access controls
  • Discuss the implementation of encryption for data at rest
  • Discuss the implementation of encryption for data in transit
  • Discuss data masking concepts
  • Discuss data backup and retention
  • Discuss data destruction concepts
  • Discuss data loss prevention concepts
Lesson 11: Enterprise Virtual Network Security
  • Discuss the evolution of network and security management concepts in modern virtualized IT environments
  • Understand essential concepts of virtualization
  • Discuss Network Virtualization (NV) security
  • Discuss SDN security
  • Discuss Network Function Virtualization (NFV) security
  • Discuss OS virtualization security
  • Discuss security guidelines, recommendations, and best practices for containers
  • Discuss security guidelines, recommendations, and best practices for Docker
  • Discuss security guidelines, recommendations, and best practices for Kubernetes
Lesson 12: Enterprise Cloud Security
  • Understand Cloud Computing Fundamentals
  • Understanding the Insights of Cloud Security
  • Evaluate CSP for Security before Consuming Cloud Service
  • Discuss security in Amazon Cloud (AWS)
  • Discuss security in Microsoft Azure Cloud
  • Discuss security in Google Cloud Platform (GCP)
  • Discuss general security best practices and tools for cloud security
Lesson 13: Wireless Network Security
  • Understand wireless network fundamentals
  • Understand wireless network encryption mechanisms
  • Understand wireless network authentication methods
  • Discuss and implement wireless network security measures
Lesson 14: Network Traffic Monitoring and Analysis
  • Understand the need and advantages of network traffic monitoring
  • Setting up the environment for network monitoring
  • Determine baseline traffic signatures for normal and suspicious network traffic
  • Perform network monitoring and analysis for suspicious traffic using Wireshark
  • Discuss network performance and bandwidth monitoring tools and techniques
Lesson 15: Network Logs Monitoring and Analysis
  • Understand logging concepts
  • Discuss log monitoring and analysis on Windows systems
  • Discuss log monitoring and analysis on Linux
  • Discuss log monitoring and analysis on Mac
  • Discuss log monitoring and analysis in Firewall
  • Discuss log monitoring and analysis on Routers
  • Discuss log monitoring and analysis on Web Servers
  • Discuss centralized log monitoring and analysis
Lesson 16: Incident Response and Forensic Investigation
  • Understand incident response concept
  • Understand the role of first responder in incident response
  • Discuss Do’s and Don’t in first response
  • Describe incident handling and response process
  • Describe forensics investigation process
Lesson 17: Business Continuity and Disaster Recovery
  • Introduction to Business Continuity (BC) and Disaster Recovery (DR) concepts
  • Discuss BC/DR Activities
  • Explain Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP)
  • Discuss BC/DR Standards
Lesson 18: Risk Anticipation with Risk Management
  • Understand risk management concepts
  • Learn to manage risk through a risk management program
  • Learn about different Risk Management Frameworks (RMF)
  • Learn to manage vulnerabilities through a vulnerability management program
  • Learn about vulnerability assessment and scanning
Lesson 19: Threat Assessment with Attack Surface Analysis
  • Understand attack surface concepts
  • Learn to understand and visualize your attack surface
  • Learn to identify Indicators of Exposure (IoE)
  • Learn to perform attack simulations
  • Learn to reduce the attack surface
  • Discuss attack surface analysis specific to cloud and IoT
Lesson 20: Threat Prediction with Cyber Threat Intelligence
  • Understand the role of cyber threat intelligence in network defense
  • Understand the types of threat intelligence
  • Understand the Indicators of Threat Intelligence: Indicators of Compromise (IoCs) and Indicators of Attack (IoA)
  • Understand the layers of threat intelligence
  • Learn to leverage and consume threat intelligence for proactive defense

Course Fee (inclusive of 9% GST)

Individual
Criteria Price inclusive of GST

Full Course Fee

$3,215.00

Singapore Citizens (SCs) and Permanent Residents (PRs)
Funding Up to 50% of course fees

$1,740.50

SCs aged ≥ 40 years old ( SkillsFuture Mid-career Enhanced Subsidy )
Funding Up to 70% of course fees

$1,150.50

Criteria Price inclusive of GST

Full Course Fee

$3,215.00

Singapore Citizens (SCs) and Permanent Residents (PRs)
Funding Up to 50% of course fees

$1,740.50

SCs aged ≥ 40 years old ( SkillsFuture Mid-career Enhanced Subsidy )
Funding Up to 70% of course fees

$1,150.50

Criteria Price inclusive of GST

Full Course Fee

$3,215.00

Singapore Citizens (SCs) and Permanent Residents (PRs)
Funding Up to 50% of course fees

$1,150.50

SCs aged ≥ 40 years old ( SkillsFuture Mid-career Enhanced Subsidy )
Funding Up to 70% of course fees

$1,150.50

SkilsFuture Credit

SSG-funded courses are eligible for SkillsFuture Credit. Singaporeans over the age of 25 can use their Skillsfuture credit to register in courses.

Post-Secondary Education Account (PSEA)

All Singaporeans aged under 31 are eligible to use their PSEA account for the following course.

Course Dates

Course Dates Mode of Delivery Duration
Instructor-Led Training (ILT)
5 Days
Instructor-Led Training (ILT)
5 Days
Instructor-Led Training (ILT)
5 Days
Instructor-Led Training (ILT)
5 Days
Instructor-Led Training (ILT)
5 Days
Instructor-Led Training (ILT)
5 Days
Instructor-Led Training (ILT)
5 Days
Instructor-Led Training (ILT)
5 Days
Instructor-Led Training (ILT)
5 Days
Instructor-Led Training (ILT)
5 Days

SSG Funding Requirements

All Trainees must take note of the following:

 

  1. Must attend at least 75% of the course before being eligible to take the assessments.
  2. Dynamic QR Code Attendance Taking:
    a. Scan the QR Code that will be displayed by the Trainer on each session. Use your SingPass App to scan and submit your attendance. If you fail to do so, you will be deemed absent from that session.
    b. The QR Code is only accessible on:
    – Morning Session: between 9.00 am to 1.00 pm.
    – Afternoon Session: between 2.00 pm to 6.00 pm.
    Please take the attendance one at a time as the system can only register you one by one.
  3. Sign daily on the Attendance Sheet as a backup if any technical glitch happens.
  4. Submit Course Evaluation by the end of each module to help us improve the course and your future learning experience with us.

Certification

Upon meeting at least 75% attendance and passing the assessment(s), participants will receive a Certificate of Completion by ITEL

Course Code: TGS-
Course Support Period: 11 Mar 2019 – 10 Mar 2027

Note: All certificate images are for illustrative purposes only and may be subject to change at the discretion of ITEL.

e-Statement of Attainment (SOA) from SkillsFuture Singapore (SSG)

Upon meeting attendance requirements and passing the assessment(s), participants will receive an e-Statement of Attainment (SOA) from SkillsFuture Singapore (SSG).

External Certification Exam[x]

The participant will be able to attempt the ..

FAQs[x]

1

Learner's Testimonials [x]

Early registrations are encouraged.  

Network Defender (SF)

Instructor-Led Training (ILT)

5 Days

From S$1,740.50 (After Eligible SSG Subsidies)

Download Network Defender (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Big Data Analytics (SF) Brochure (Testing)

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Big Data Analytics (SF) Brochure (Testing)

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Data Science and Machine Learning (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download CompTIA Security+ (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Data Science and Machine Learning (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Microsoft Certified Solutions Associate (MCSA) – 20742 (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Microsoft Certified Solutions Associate (MCSA) – 20741 (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Microsoft Certified Solutions Associate (MCSA) – 20740 (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Business Analysis Professional (SF) (Synchronous E-Learning) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Microsoft Azure Security Technologies (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Implementing SQL Database Administration (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download VMware Vsphere: Install, Configure, Manage (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Design Mobile Applications on Android OS Platform (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download CompTIA Network+ (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download CompTIA Cloud Essentials+ (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Big Data Analytics (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download ITIL® Foundation Certificate in Service Management (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Project Management (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Windows Server 2019 Administration (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Windows Server 2019 Administration (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cloud Technology Solutions Architect Associate (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Security Analysis and Penetration Testing (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Information Systems Security (SF) [OLL] Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Microsoft Certified: Azure Fundamentals (AZ-900) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Microsoft Certified Azure Network Engineer Associate (AZ-700) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cyber Threat Intelligence Analyst (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cyber Forensics Investigator (SF) [OLL] Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cyber Security Incident Handling and Response (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Certified Ethical Hacker (CEH) (SF) [OLL] Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Certified Ethical Hacker (CEH) (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download (SCTP) Advanced Certificate in Cyber Security Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download (SCTP) Higher Certificate in Network Administration Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Strategic Cyber Security Leadership (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Download Cisco Certified Network Associate (CCNA) (SF) Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Course Listing Download Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List

Cisco Certified Network Associate Download Course Brochure

This field is for validation purposes and should be left unchanged.
Sign Up For Our Mailing List
Course Enquiry for Network Defender (SF)

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
I want to find out more about:*
Where did you hear of ITEL?*
*Note: If you chose Others, kindly provide more information in the Remarks/Comments/Questions box.
Consent*
Newsletter Subscription