VPN security, wireless and mobility, summary

Blended learning

À qui s'adresse la formation?

CIO, CISO, security manager, consultants, administrators

Niveau atteint

Avancé

Durée

1,00 jour(s)

Langues(s) de prestation

EN FR

Prochaine session

Objectifs

This training provides a comprehensive overview of threats and solutions to counter them.

  • Assessing safety risks in a context of mobility
  • Knowing the types of attack
  • Understanding the VPN solution
  • Securing Wireless Networks and Smartphones

Contenu

THREATS AND VULNERABILITIES

  • Evolution of cybercriminality.
  • Statistics and evolution of the attacks.
  • Risk assessment in a context of mobility.

ATTACKS ON USERS

  • User-oriented attack techniques.
  • Social engineering techniques.
  • Malicious codes and social networks.
  • The specific dangers of 2.0 Web.
  • Attack on passwords.
  • "Man in the Middle" attack.

ATTACKS ON CLIENT DESKTOPS

  • Risks specific to client workstations (worms, viruses, etc.).
  • The safest navigator.
  • Rootkit browser and user desktop.
  • What is the real efficiency of antivirus software?
  • The risks associated with removable devices.
  • The role of the personal firewall.
  • Security of USB keys.
  • Client desktops and virtualization.

VIRTUAL PRIVATE NETWORK (VPN) SECURITY

  • Tunneling techniques. Remote access via Internet: panorama of the offer.
  • PPT, LTP, L2F protocols for VPNs.
  • IPsec standard and AH, ESP, IKE protocols.
  • VPN solutions for 3G access.
  • Which solutions for Blackberry, iPhone...?
  • SSL VPN: technology and its limits.
  • The overview of the SSL VPN offer. Criteria of choice.
  • IPsec or SSL VPN: which choice for the nomad workstation?

WIRELESS NETWORK SECURITY

  • Access Point security (SSID, MAC filtering...).
  • Why is WEP dangerous? What do WPA, WPA2 and the 802.11i standard provide?
  • Authentication in corporate Wi-Fi networks.
  • VPN (IPsec) technologies for Wi-Fi networks.
  • How is the security of a Wi-Fi hotspot ensured?
  • Attack techniques on WPA and WPA2.
  • False terminals (Rogue AP).
  • Specific attacks on Bluetooth.

SMARTPHONE SECURITY

  • Security on mobiles (Edge, 3G, 3G+...).
  • The specific risks of Smartphones.
  • Security flaws: the ranking by platform.
  • Viruses and malicious code: what is the real risk?
  • Protect your data in case of loss or theft.

Certificat, diplôme

Un certificat sera délivré à l'issue de la formation

Ces formations pourraient vous intéresser

FR
Journée
Informatique et systèmes d'information - Système information - Architecture système information - Cloud Computing
EN
Journée
Informatique et systèmes d'information - Informatisation - Conduite projet informatique
FR
Journée
Informatique et systèmes d'information - Système information - Architecture système information - Cloud Computing