In today’s security landscape, the network perimeter has ceased to be a single, easily definable boundary. In order to mount a defense from outside attacks on your network, information security experts are required to have a deep and diverse understanding of a number of technologies and applications.
This course will offer hands-on problem solving in a lab setting. You will learn how to identify and address potential weaknesses in realistic scenarios. You will be presented with a variety of open-source and commercial products in this course, offering the widest possible view of potential threats and possible situations.