view cart | home | contact us | search

Data-Savvy 202: End-to-End Security *NEW*

Printer-friendly PDF version

With the explosive growth of the Internet and mobile devices and applications, cybersecurity has become a hot topic among industries, technologists, regulators, and consumers alike. Security threats proliferate from traditional PCs, servers, and the Internet, to mobile devices, mobile applications, and mobile networks, prompting the security community to accelerate their development of security solutions. Operators with network and IT infrastructures are in a unique position to provide security solutions to address some of the security risks. As such, operators need to be able to speak the language of security with accuracy and confidence. End-to-End Security provides a foundational understanding of the security terms and concepts likely to arise in discussions with customers. Throughout the session, practical examples illustrate the concepts.

Learning Objectives

After completing this course, the student will be able to:
• List several main types of security threats
• Identify the key concepts including authentication, ciphering, integrity, and availability in security assurance
• Describe the basics of public key infrastructure and digital certificates
• Name the key protocols used in securing data transmission
• Describe the role of IPSec and the different services IPSec provides
• Understand the main security mechanisms used in LTE and WiFi wireless networks
• Describe several types of network security appliances
• Articulate the main concerns in device security and the approaches to address these concerns
• Understand the different aspects of security assurance beyond technical considerations

Intended Audience

This course is intended for those in sales engineering roles with a need to understand and be conversant in the world of security as it relates to devices, infrastructure, and applications and services.

Course Length

1 day

Course Outlines / Knowledge Knuggets

1. Security Threats
1.1. The growing security problem
1.2. Types of threats
1.2.1. Attacks on data
1.2.1.1. Data at rest
1.2.1.2. Data in transit
1.2.2. Attacks on networks
1.2.3. Exploiting people
1.2.4. Exploiting software
1.3. Example: Security in the news

2. The Foundations of Security Assurance
2.1. Authentication
2.2. Ciphering/encryption and public key infrastructure
2.3. Integrity
2.4. Availability
2.5. Example: Encryption and decryption

3. Security Protocols
3.1. IPSec
3.2. SSL/TLS
3.3. RADIUS/DIAMETER
3.4. Example: SSL and certificates
3.5. Case Study: Heartbleed bug/OpenSSL

4. Security in Wireless Networks
4.1. LTE network security
4.2. WiFi network security

5. Network Security
5.1. Firewalls
5.2. Intrusion detection systems
5.3. Case study: IDS

6. Device Security
6.1. Mobile device vulnerabilities
6.2. BYOD and mobile device management
6.3. Authentication and authorization
6.4. Securing M2M devices
6.5. Case study: Device breach

7. Application and Software Security
7.1. Security in software development
7.2. Viruses, Worms, and Trojan Horses
7.3. Example: Software exploitation

8. Security is a Process
8.1. End-to-end security
8.2. Security and regulatory standards
8.2.1. Common criteria
8.2.2. PCI, FIPS, HIPPA, NIST
8.3. Big Data and security
8.4. Example: Process breach

------------------------------------
WHY CUSTOMERS LOVE OUR ELEARNING:

- Self-paced, animated, and interactive

- $150/each course for 6 month license

- Immediate online access upon purchase

- Flexible way to take training at any hour

- Online training transcript available

- Electronic certificates at completion


- Full list of courses at
  www.awardsolutions.com/elearning.pdf

CONTACT US

For any additional questions,
please contact Mr. Rod Marckese
at +1-972-664-0727 x246 or
public.training@awardsolutions.com

Award Solutions, Inc.    2100 Lakeside Blvd., Suite 300, Richardson, TX    Contact Us 
© 2016 Award Solutions, Inc. All rights reserved.