This can be taught as a 2 hour, half day, 1 day, or 2 day course.
You will learn:
In the beginning, there were no firewalls. And at the time, we “saw that it was good.” But just as the change of a community from small town to city brings changes in lifestyle, particularly in personal and home security, the growth of the Internet has required changes in network security mechanisms and methods. We’ve moved from defensive solutions, to the need for enabling solutions. This course will give an overview of a multidimensional model for security, looking at three levels in three areas. We will explore the realms of security (prevention, detection, response), the steps in security management (planning, policy, and production), and the arenas of security deployment (perimeter, servers, and desktops).
Course Outline
Internet and Computer Threats, Issues, and Concerns Things that make networks insecure Threat agents Avenues of threat Famous and infamous incidents Single Layer, Single Dimension Security Examples The first firewalls Growing user "requirements" Multilayer, Single Dimension Security Added strengths Residual weaknesses Multilayer, Multidimensional Security Steps in security management Planning, policy, and procedures Products and Practice Persistent research and analysis Types of Security Prevention devices Detection devices Response devices Places to Deploy Perimeter devices Server devices Desktop devices Putting it Together Results and Conclusions