Course : System and Network Security, Level 1

Practical course - 4d - 28h00 - Ref. FRW
Price : 2970 CHF E.T.

System and Network Security, Level 1



Required course



INTER
IN-HOUSE
CUSTOM

Practical course in person or remote class
Available in English on request

Ref. FRW
  4d - 28h00
2970 CHF E.T.






Teaching objectives
At the end of the training, the participant will be able to:
Know the flaws and threats of information systems
Learn the role of various security devices
Design and create a suitable security architecture
Implement the most common means of securing networks
Securing a Windows and Linux system
Participants
Implementing an HTTP proxy solution in Windows or Linux, an antivirus solution for network flows. Designing and implemen
TRAINING PROGRAM

Practical details
Implementing an HTTP proxy solution in Windows or Linux, an antivirus solution for network flows. Designing and implementing a multi-firewall, multi-DMZ architecture. Implementing fundamental techniques to make the operating system secure.

Course schedule

1
Risks and threats

  • Introduction to security.
  • Overview of IT security.
  • IT security vocabulary.
  • "Low-level" attacks.
  • Strengths and weaknesses of the TCP/IP protocol.
  • Illustration of ARP, IP Spoofing, TCP-SYNflood, SMURF, and other attacks.
  • Denial of service and distributed denial of service.
  • Application attacks.
  • Intelligence gathering.
  • HTTP: A particularly vulnerable protocol (SQL injection, Cross Site Scripting, etc.).
  • DNS: Dan Kaminsky attack.
  • Hands-on work ¤Installation and use of the Wireshark network analyzer. Implementing an application solution.

2
Security architectures

  • What architectures for what needs?
  • Secure addressing plan: RFC 1918.
  • Address translation (FTP as an example).
  • The role of demilitarized zones (DMZ).
  • Example architectures.
  • Making the architecture secure through virtualization.
  • Firewalls: Cornerstone of security.
  • Actions and limits of traditional network firewalls.
  • Technological change in firewalls (Appliance, VPN, IPS, UTM, etc.).
  • Firewalls and virtual environments.
  • Proxy server and application relay.
  • Proxy or firewall: Conflicting or complementary?
  • Reverse proxy, content filtering, cache, and authentication.
  • SMTP relay, a must?
  • Hands-on work ¤Implementation of a Caching proxy/Authentication.

3
Data security

  • Cryptography.
  • Symmetrical and asymmetrical encryption. Hash functions.
  • Cryptographic services.
  • User authentication.
  • Importance of reciprocal authentication.
  • X509 certificates. Electronic signature. Radius. LDAP.
  • Worms, virus, Trojans, malware, and keyloggers.
  • Current trends. Antiviruses available, complementary nature of elements. EICAR, a “virus” to recognize.
  • Hands-on work ¤Deploying an SMTP relay and an HTTP/FTP antivirus proxy. Implementing a server certificate.

4
Transfer security

  • WiFi security.
  • Risks inherent in wireless networks.
  • The limits of WEP. WPA and WPA2 protocol.
  • Types of attacks.
  • Man in the Middle attack with Rogue AP.
  • The IPSec protocol.
  • Overview of the protocol.
  • Tunnel and transport modes. ESP and AH.
  • Analyzing the protocol and associated technologies (SA, IKE, ISAKMP, ESP, AH, etc.).
  • The SSL/TLS protocols.
  • Overview of the protocol. Details of the negotiation
  • Analysis of main vulnerabilities.
  • Sslstrip and sslsnif attacks.
  • The SSH protocol. Overview and features
  • Differences with SSL.
  • Hands-on work ¤Carrying out a Man in the Middle attack on an SSL session. Implementing IPSec transport mode/PSK.

5
Making a system secure, “Hardening”

  • Presentation.
  • Insufficiency of default installations.
  • Evaluation criteria (TCSEC, ITSEC, and common criteria).
  • Making Windows secure.
  • Account and authorization management.
  • Control of services.
  • Network configuration and auditing.
  • Making Linux secure.
  • Kernel configuration.
  • File system.
  • Network and service management.
  • Hands-on work ¤Example of making a Windows and Linux system secure.

6
Auditing and security on an everyday basis

  • Tools and techniques available
  • Intrusion tests: Tools and means.
  • Detecting vulnerabilities (scanners, IDS probes, etc.).
  • Real-time IDS-IPS detection tools, agent, probe, or cut-off.
  • Reacting effectively in all circumstances.
  • Supervision and administration.
  • Organizational impacts.
  • Technological monitoring.

7
Case study

  • Prior study.
  • Analysis of needs.
  • Creating an architecture.
  • Defining the action plan.
  • Deployment.
  • Approach to installing elements.
  • Implementing the filtering policy.
  • Hands-on work ¤Creating flow management.


Customer reviews
4,5 / 5
Customer reviews are based on end-of-course evaluations. The score is calculated from all evaluations within the past year. Only reviews with a textual comment are displayed.
SIMON F.
16/12/25
5 / 5

Ludovic was able to completely adapt his session and his message to my level, which wasn't the one required for this training course, and that's a real plus. The trainer has strong technical skills and knows how to explain his message in simple terms.
SAMUEL G.
02/12/25
5 / 5

I don't think we did that much practical work, but I think that's because we were doing a video conference. Otherwise, the content was very interesting and the trainer very educational.
THOMAS D.
02/12/25
5 / 5

Top. Well done Fred for your quality of animation



Dates and locations

Dernières places
Date garantie en présentiel ou à distance
Session garantie
From 21 to 24 April 2026 *
FR
Remote class
Registration
From 23 to 26 June 2026
FR
Remote class
Registration
From 23 to 26 June 2026
EN
Remote class
Registration
From 25 to 28 August 2026
FR
Remote class
Registration
From 25 to 28 August 2026
EN
Remote class
Registration
From 22 to 25 September 2026
FR
Remote class
Registration
From 1 to 4 December 2026 *
FR
Remote class
Registration
From 1 to 4 December 2026
EN
Remote class
Registration

REMOTE CLASS
2026 : 21 Apr., 23 June, 23 June, 25 Aug., 25 Aug., 22 Sep., 1 Dec., 1 Dec.