+++ @RonaldSchlager ranked #27 in Mio's "Unified Comms Influencers: The Top 50 for 2019 Revealed" +++ @RonaldSchlager ranked #23 in Onalytica´s List "Unified Communications": Top 100 Influencers and Brands for 2016 +++

Seminar – Networking Security


Networking Security

The seminar covers important terms of security technologies, different security aspects, problems and approaches to increase networking security from a vender and supplier independent view.


Duration: 2 days

Date: No dates yet specified. Send us your inquiry! 

WHY you should attend

  • You need to know actual security threats and problems
  • You are responsible for selection and implementation of security functions
  • You are interested in different technological solutions with their characteristics and their impact to your organization



Network knowledge is required.

CONTENT of the Seminar 


Citations, Studies, Publications – Why Security? – Threats – Security Philosophy & Concepts – Standards

Problem Areas

Physical Access and Entry – Electromagnetic Attacks – Remote Access – TCP/IP Protocols – WLAN Risks – Telephony – Spam Mails – Viruses, Worms, Hoaxes – Other dangers

Technical Functions

Introduction (Areas, Measures, Transmission Technology, Protection) – Authentication (Passwords, One-Time-Password, Challenge Response Procedure, Token Function, IEEE 802.1x, RADIUS,….) – Encryption (symmetric, asymmetric, Key Management, Definition of an Encryption Concept)

Security Elements

Malware Protection: Antivirus Software – Packet Filter (Filter Functions, Limitations)

Application Layer Gateway (Proxy): Basic and security relevant Functions

Firewall: Introduction, Application, Functions, Tasks, Functional Building Blocks, Concepts (Single-Homed, Multi-Homed, Demilitarized Zone (DMZ), Multi Level Provider Access, Position of Servers) – Alarming – Logging – Checklist for Product Selection – Vendor Examples

Intrusion Detection / Protection Systems: Definition of Terms, Main Tasks, Functions, Host-based versus Network-based, Checklist for Product Selection – Vendor Examples

Network Forensic: Tasks, System Elements

Secure Networks: Virtual Private Networking: General, Tunnelling Procedures, Protocols, Components, Solutions, Vendors, Provider

WLAN Security: Security Measures, Encryption, IEEE 802.11i, Network Design, additional Protection Measures, Security Precausion according to Recommendations of the German Federal Agency for Information Technology (Bundesamt für Sicherheit in der Informationstechnik)

WAN Security: WAN specific Problems, Security Measures, Security of Service Providers



Additional SEMINARS

TCP/IP – Details

IPv6 – Details

IPv6 – Security



Are you interested in seminar handouts? Check out our published book program.



Send us your inquiry! 



Click here to opt-out from Google Analytics.