1. Main elements of a network
  2. Network technology
  3. Support for business continuity

  1. OSI Model
  2. Pragmatic Approach of the Layer Model
  3. Standards and Organisations

  1. Role of a network interface
  2. Options and Configuration Settings
  3. Booting from the Network
  4. Data encoding
  5. Signal conversion
  6. Transmission Supports

  1. Network card configuration
  2. Network card driver installation and configuration
  3. Protocol stack
  4. Detecting a network problem

  1. Topologies
  2. Choosing the adapted network topology
  3. Communications Management
  4. Interconnection

  1. Lower Layers and IEEE
  2. Ethernet and IEEE 802.3
  3. Token Ring and IEEE 802.5
  4. Wi-Fi and IEEE 802.11
  5. Bluetooth and IEEE 802.15
  6. Other technologies

  1. Local network interconnection
  2. Remote access and virtual private networks

  1. Main protocol families
  2. IP protocol version 4
  3. IP protocol version 6
  4. Other Internet layer protocols
  5. Voice over IP (VoIP)
  6. TCP and UDP transport protocols
  7. TCP/IP application layer

  1. Understanding the need for security
  2. Tools and Types of Attack
  3. Protection Concepts in Local Area Network
  4. Network Interconnection Protection

  1. Introduction to network repair
  2. Diagnosis in lower layers
  3. Using Adapted TCP/IP Tools
  4. Analysis Tools for Upper Layers

  1. Security at the Physical Layer
  2. Security at the Data Link Layer
  3. Security at the Network Layer
  4. Security at the Transport Layer
  5. Security at the Application Layer

  1. Identification of the PKI Components and its Relationship Models
  2. Certificate Authority and its Elements
  3. Certificate Revocation List (CRL)
  4. How certificate signing requests (CSRs) work
  5. Private Management Infrastructures (PMIs)
  6. Attribute Certificate Fields
  7. Applications that rely on the existence of a PKI

  1. General Concepts
  2. Identification and Characterisation of the System Operating Data
  3. Most common IDS architectures
  4. Relation between the Different IDS/IPS
  5. Security Criteria to Establish the Location of the IDS/IPS

  1. Prior Analysis
  2. Definition of Policies to Cut Off Intrusion Attempts
  3. Analysis of the events recorded by the IDS/IPS
  4. List of Audit Records
  5. Establishment of the Required Levels

  1. What Is SIEM?
  2. Evolution of the SIEM Systems
  3. Architecture of a SIEM system

  1. Problems to solve
  2. Log management
  3. IT Compliance Standards
  4. Event Correlation
  5. SIEM solutions on the market