- Main elements of a network
- Network technology
- Support for business continuity
- OSI Model
- Pragmatic Approach of the Layer Model
- Standards and Organisations
- Role of a network interface
- Options and Configuration Settings
- Booting from the Network
- Data encoding
- Signal conversion
- Transmission Supports
- Network card configuration
- Network card driver installation and configuration
- Protocol stack
- Detecting a network problem
- Topologies
- Choosing the adapted network topology
- Communications Management
- Interconnection
- Lower Layers and IEEE
- Ethernet and IEEE 802.3
- Token Ring and IEEE 802.5
- Wi-Fi and IEEE 802.11
- Bluetooth and IEEE 802.15
- Other technologies
- Local network interconnection
- Remote access and virtual private networks
- Main protocol families
- IP protocol version 4
- IP protocol version 6
- Other Internet layer protocols
- Voice over IP (VoIP)
- TCP and UDP transport protocols
- TCP/IP application layer
- Understanding the need for security
- Tools and Types of Attack
- Protection Concepts in Local Area Network
- Network Interconnection Protection
- Introduction to network repair
- Diagnosis in lower layers
- Using Adapted TCP/IP Tools
- Analysis Tools for Upper Layers
- Security at the Physical Layer
- Security at the Data Link Layer
- Security at the Network Layer
- Security at the Transport Layer
- Security at the Application Layer
- Identification of the PKI Components and its Relationship Models
- Certificate Authority and its Elements
- Certificate Revocation List (CRL)
- How certificate signing requests (CSRs) work
- Private Management Infrastructures (PMIs)
- Attribute Certificate Fields
- Applications that rely on the existence of a PKI
- General Concepts
- Identification and Characterisation of the System Operating Data
- Most common IDS architectures
- Relation between the Different IDS/IPS
- Security Criteria to Establish the Location of the IDS/IPS
- Prior Analysis
- Definition of Policies to Cut Off Intrusion Attempts
- Analysis of the events recorded by the IDS/IPS
- List of Audit Records
- Establishment of the Required Levels
- What Is SIEM?
- Evolution of the SIEM Systems
- Architecture of a SIEM system
- Problems to solve
- Log management
- IT Compliance Standards
- Event Correlation
- SIEM solutions on the market