Network Security (DE/EN)
In this hands on course you will learn the basics of how to secure a computer network. After the course you will be able to determine possible threats and implement counter measures.
Content
During the course we’ll cover:
- Terminology of Network Security
- Attacks on Protocols (ARP Spoofing, DNS Hijacking, etc.)
- Secure Communication with TLS
- Security Mechanisms (SSH, Tunneling, etc.)
- Network Analysis (Network Mapping, Scanning, etc.)
- Authentication & Authorization (Auth. Providers, Bypasses, etc.)
- Wireless Security (WPA2, WEP, Bluetooth)
Prerequisites
This class is aimed at network administrators, consultants, testers and CISOs. A basic understanding of network technologies such as IP/TCP is needed.
Info
- Course Duration: 1 day
- Laptop required?: No, a Thinkpad will be prepared
- Price: 600 Euros
- Certification: Fraunhofer Academy Certificate
Target Audience
The course is best suited for:
- Network Administrators
- Consultants
- Software Testers/Developers
- CIOs
If you’re unsure whether it’s suited for you, contact us at course@itsec.rocks.
Booking
The next available training dates are:
- 18.08.2020
- or suggest an individual date
To book a training, please send an email to booking@itsec.rocks, stating your name and the number of participants.
Trainer
Michael Rademacher
My name is Michael Rademacher, I’m a researcher and lecturer in the field of computer networks and security. I am currently working for UAS Bonn-Rhein-Sieg and Fraunhofer FKIE.
I have spend a lot of time investigating (wireless) network protocols and security for my PhD. I have presented my research at major conferences on the topics of Secure (Wireless) Communication, Software Defined Networking and Wireless Sensor Networks. I gladly pass on knowledge about everything technology related.
Lukas Schauer
My name is Lukas Schauer, I’m a security researcher, developer, system administrator and hacker from Bonn.
I started developing and network administration very early. Actually by managing my schools network infrastructure. Since then I’ve acquired skills in different areas, especially in software development. I am - among other things - maintaining dehydrated, manage the institutes network and break the security of embedded devices.
As part of RedRocket I’m constantly learning new ways of attacking and protecting software and networks.