Voice Search
Voice Search

System and Network Security Introduction Training - Classroom


Rated 9.3 out of 10 based on over 6784 reviews

Free course advice
Learn more about how we use your data

What is the System and Network Security Introduction Training course?

Analysing and assessing network risks is a big part of Network Security, and having the required skills is essential to ensure you are able to select and deploy appropriate countermeasures to combat these risks. This course will help you gain the knowledge and skills to do that.

Available delivery methods for this course


Group booking

Group booking

Key features of the course

  • Delivery Method: Classroom
  • Exam: Included
  • Tutor Support Included
  • Accredited & Experienced Trainers
  • Duration: 4 Days

Browse classroom dates below






Location Date Duration Price Availability
Live OnlineMay 26th 2020  4 Days£1,995 ex. VATAvailable
Enquire now
Book now
LondonAug 11th 2020  4 Days£1,995 ex. VATAvailable
Enquire now
Book now
Live OnlineAug 11th 2020  4 Days£1,995 ex. VATAvailable
Enquire now
Book now

Is the System and Network Security Introduction course right for me?

If you’re currently in an IT/ Cyber Security role at work but need certification, this course would be beneficial for you. Alternatively, if you’re looking to move into this sector for your next role, with a focus on security, this course will help get you started.

Why Choose e-Careers?

e-Careers has partnered with The Learning Tree, to offer a range of courses, delivered via high-tech classrooms or virtual learning, depending on your requirement.

We are an award-winning, established eLearning course provider, with over 16 years’ experience in the industry.  We offer high-quality training courses at competitive prices.

What will I learn on this course?

Through a range of practical exercises, you’ll learn how to search for possible vulnerabilities in operating systems, evaluate correct methods for strong authentication, and understand how you can help to reduce your company’s exposure to potential dangers. You’ll also gain the skills to protect your organisation’s data and systems, deploy firewalls and data encryption and manage risks.

Classroom-based Training 

 e-Careers were originally an online learning organisation but over time we’ve established additional learning methods, to provide our delegates with a variety of study options, including:

  • Bespoke training
  • Classroom-based training
  • On-site training
  • LiveOnline (virtual learning)

The Classrooms

Our classroom training centre is in London, Euston, conveniently located directly opposite Euston station, making transport and accessibility easier.

Our clean, high-tech classrooms provide a comfortable learning environment for our delegates, and we pride ourselves on providing a first-class training experience. You’ll notice this from your first steps in our London training centre, right through to your last day on the course, helping you to feel welcomed and comfortable. 

Each classroom has been designed to perfectly suit the courses being offered. For example, our Cyber Security classrooms come kitted out with a range of high specification PC’s (typically i7’s), with monitors for you to work through the practical assignments and an additional vertical screen to view your digital course materials.

Your instructor will use cutting-edge technology to ensure a high-quality learning experience for all delegates, including the latest annotation hardware and software.  

Alternatives to Classroom-based study

We understand that not every delegate has the same date availability or can’t make it to London, so we have created a range of suitable alternatives, including:  

  • LiveOnline – This is our virtual classroom option. Be a fully participating and integrated member of the classroom but from the comfort of your own home or office. We supply you with all the course materials required to fully participate with the class. 
  • eLearning – This is our Online/ Distance learning option. If a classroom or LiveOnline option are unsuitable for your requirements, we do offer a full online course option, where you can study at your own pace and in your own time.

Module 1 – Building a secure organisation

  • Real threats that impact cybersecurity
    • Hackers inside and out
    • Eavesdropping
    • Spoofing
    • Sniffing
    • Trojan horses
    • Viruses
    • Wiretaps
  • A cyber security policy: the foundation of your protection
    • Defining your information assurance objectives
    • Assessing your exposure

Module 2 – A Cryptography Primer

  • Securing data with symmetric encryption
    • Choosing your algorithm: DES, AES, Rc4 and others
    • Assessing key length and key distribution
  • Solving key distribution issues with asymmetric encryption
    • Generating keys
    • Encrypting with RSA
    • PGP and GnuPG
    • Evaluating Web of Trust and PKI
  • Ensuring integrity with hashes
    • Hashing with Md5 and SHA
    • Protecting data in transit
    • Building the digital signature

Module 3 – Verifying user and host identity

  • Assessing traditional static password schemes
    • Creating a good quality password policy to prevent password guessing and cracking
    • Protecting against social engineering attacks
    • Encrypting passwords to mitigate the impact of password sniffing
  • Evaluating strong authentication methods
    • Preventing password replay using one-time and tokenised passwords
    • Employing biometrics as part of multi-factor authentication
  • Authenticating hosts
    • Distrusting IP addresses
    • Address-spoofing issues and countermeasures
    • Solutions for wireless networks

Module 4 – Preventing systems intrusions

  • Discovering system vulnerabilities
    • Searching for operating system vulnerabilities
    • Discovering file permission issues
    • Limiting access via physical security
  • Encrypting files for confidentiality
    • Encryption with application-specific tools
    • Recovering encrypted data
  • Hardening the operating system
    • Locking down user accounts
    • Securing administrator's permissions
    • Protecting against viruses

Module 5 – Guarding against network intrusions

  • Scanning for vulnerabilities
    • Searching for rogue servers
    • Profiling systems and services
  • Reducing Denial of Service (DoS) attacks
    • Securing DNS
    • Limiting the impact of common attacks
  • Deploying firewalls to control network traffic
    • Preventing intrusions with filters
    • Implementing cyber security policy
    • Deploying personal firewalls
  • Protecting web services and applications
    • Validating user input
    • Controlling information leakage

Module 6 – Ensuring network confidentiality

  • Threats from the LAN
    • Sniffing the network
    • Mitigating threats from connected hosts
    • Partitioning the network to prevent data leakage
    • Identifying wireless LAN vulnerabilities
  • Confidentiality on external connections
    • Ensuring confidentiality with encryption
    • Securing communication with IPSec

We’re trusted by

Individuals, small businesses and large corporations who have used e-Careers since 2001. Here are some names you’ll recognise:

Saatchi & Saatchi
American Express

Do you know someone who’d love this course? Tell them about it...