![]() |
|
|
|
Course Description | Outline | Linux Training | IT TrainingOverviewAfter a detailed discussion of the TCP/IP suite component protocols and ethernet operation, the student practices using various tools to capture, analyze, and generate IP traffic. Students then explore the tools and techniques used to exploit protocol weaknesses and perform more advanced network attacks. After building a thorough understanding of network based attacks, course focus shifts to the defensive solutions available. Students install, configure, and test powerful network analysis and intrusion detection tools. Finally, students create a Linux based router / firewall solution, including advanced functionality such as NAT, policy routing, and traffic shaping. PrerequisitesSince the tools used in class are compiled and run on a Linux system, Linux or UNIX system experience is recommended. A solid background in networking concepts will greatly aid in comprehension. This is an intense class that covers many topics. Schedule5 Days ContactE-mail info@umbctrainingcenters.com or call (443) 692-6599:
|