קורסים מקצועיים למתקדמים

סייבר ואבטחת מידע

Network Security

מספר הקורס 71583

למה ללמוד בג'ון ברייס?
  • למידה חדשנית ודינמית עם כלים מתקדמים בשילוב סימולציות, תרגול וסביבות מעבדה
  • מגוון הכשרות טכנולוגיות עם תכנים המותאמים להתפתחות הטכנולוגית ולביקוש בתעשיית ההייטק
  • מובילים את תחום ההכשרות לעולם ההייטק והטכנולוגיה כבר 30 שנה, עם קהילה של עשרות אלפי בוגרים
  • אתם בוחרים איך ללמוד: פרונטאלית בכיתה, מרחוק ב- Live Class או בלמידה עצמית

המועדים הקרובים

קורס לקבוצות

הקורס נפתח במתכונת של קבוצה בלבד, בהתאמה אישית לארגונים.
לפרטים נוספים: Muzman@johnbryce.co.il

ניתן לפתוח את הקורס בהתאמה אישית ומלאה לצרכי הארגון, במועדים ומערכי לימוד גמישים בשילוב תכנים ייעודים.

משך הקורס

שעות אקדמיות:


מספר מפגשים:

קורס בוקר:


מספר מפגשים:

קורס בוקר:


מתכונת הקורס

הקורסים המוזמנים לארגונים מותאמים באופן אישי ומלא לצרכי הארגון, מערכי הלימוד גמישים וניתן לשלב בהם תכנים רלוונטיים וייעודיים.


Network security is a board term that covers multiple technologies, devices, and processes. Nowadays, every organization, regardless of size, industry, or infrastructure, requires a network security expert in place to protect it from the ever-growing landscape of cyber threats today. After this course, you will be able to discover security vulnerabilities across the entire network by using network hacking techniques and vulnerability scanning. You will understand the various types of firewalls that are available and master the hardening for both Windows and Linux servers

On Completion, Delegates will be able to

Learn the cyber threat landscape that modern organizations face

Acquire the necessary knowledge and tools to defend the corporate network from various cyber threats

Identify when attacks are happening on the network

Test networks and systems for vulnerabilities

Learn how to analyze network traffic and create a monitoring environment to operate as a semi-Security Operations Center

Become familiar with available tools for performing security-related tasks

למי מיועד הקורס

Course Content

המכללה שומרת לעצמה את הזכות לערוך שינויים בתנאים הנוגעים לקורס על מנת להתאים את הלימודים לנסיבות שאינן בשליטתה. לרבות באמצעות שינוי מקום הלימוד, שינוי מועד פתיחת הקורס,  החלפת מתכונת הלימוד ללימודים מקוונים, ו/או הקפאת הלימודים בקורס והמשכם לאחר חלוף הנסיבות שדרשו זאת ו/או כל שינוי אחר שיידרש לאור נסיבות שאינן בשליטת המכללה כאמור. בקרות נסיבות כאמור, המכללה תבחר ותיישם כל שינוי שידרש בהתאם למיטב שיקוליה המקצועיים.

Full syllabus
PDF להורדה

Module 1: Cyber Security in Networks

This module will dive deeper into the world of cybersecurity, the primary goal being to teach participants to embrace the attacker state-of-mind to recognize the necessary defense mechanisms. Participants will deal with several types of malware, spyware, viruses, and vulnerabilities that can put the organization network at risk—also, different social-engineering techniques and Honeypots.

  • Network Security Fundamentals
    • Principles of Network Security
    • Security Terminologies
    • Security Procedures
    • Understanding IPv6 Concepts

     Lab Setup: Creating your Organization Domain

    • Identifying Application Attacks
    • Analyzing C&C Communications
    • Reversing Malware Network Behavior

Module 2: Advanced Network Awareness

Large organizations these days suffer greatly from network attacks and malicious intrusions. Those who manage the organization’s network have an immense impact on ensuring its safety. This module will teach the student to embrace the role of the network security administrator. Students will learn to inspect the network and find targets and possible security issues before the attackers can use them.

  • Analyzing the Network
    • Preforming Web-Screenshots using NMAP
    • Detecting Service Changes using Shodan CLI
    • Launching NSE to Detect Possible Vulnerabilities
    • The Methodology of Finding Hosts in the Network
    • Capturing Fake MAC and IP Addresses Spying the Local Network using Driftnet and Urlsnarf
    • Hunting for Rootkits with windbg Using Sysinternals Suite to Identify Unusual Ports
    • Explaining Network Exposure
    • Breaking Down CVEs
    • Detecting Vulnerabilities
    • CVE Identifiers

Module 3: Hardening the Network

This module will explain a wide verity of IT security concepts and tools. The students will learn the step by step of hardening measures. Explore some security weaknesses of the Linux operating system, and learn to protect against those weaknesses.  Learn how to secure the various account types on a Linux system, enforce strong passwords, configure the firewall, and more.

Routing and Network Components Hardening

  • Understanding Firewalls
    • Iptables vs. UFW
    • Monitoring the FW using Tshark
    • IP Chains Concepts
    • Mitigating DoS Techniques
    • Static ARP and DHCP Entry to Prevent Poisoning
    • IPv6 Protocols
    • Protecting Against Rogue DHCPv6 Servers
    • Mitigate IPv6 Attacks
    • DDOS in IPv6
    • Designing and Configuring an IDS
    • Constructing Honeypots
    • Session Hijacking Counter-Measures
    • Identifying Log Tampering

Module 4: Linux and Windows Hardening

This module will cover foundational security concepts and guidelines that can help Linux and Windows systems administrators keep their servers safe. The training includes in-depth walkthrough hardening measures, and step-by-step creating your security environment.

  • Securing Linux
    • Key Concepts Linux
    • Administration and Security
    • Linux Network Files
    • Linux Network Process
    • Key Linux Network Commands
    • Hardening Linux
    • Network File System
    • Network Information Service
    • Securing Windows
    • Windows Fundamental Security
    • Windows Infrastructure
    • Windows Authentication
    • Windows User and Group Security
    • SMB Hardening against Enumerations


  • Basic Linux
  • SOC or Penetration-Testing Experience
סימולטור - Cyberium Arena

The courses at John Bryce Training allow you to gain experience with unique simulators and hands-on practice labs that include a variety of scenarios. Students are given the opportunity to put in practice what they have learned in order to retain all the relevant skills and information they were given throughout the course, this way upgrading their knowledge and expertise.

The simulator that is used in the hands on practice labs is The Cyberium system. This is an advanced cyber scenario simulator which has been developed by cyber experts who have been constantly involved in cyber training and in giving knowledge gaps solutions in the field of cyber. The simulator includes two main types of scenarios – educational and realistic.

Each educational scenario is focused on a different aspect of the course and simulates a specific aspect of the training topics. Each issue or topic taught in the course has a point exercise that allows the student to focus on it and deeply learn it.

The realistic scenarios simulate possible or past incidents related to Information Security. This includes everything from topics such as the Regulation of Cyber Systems to Attacks by Terrorist Hacker Organizations. These scenarios are broader than the educational exercises and require more of a systemic, strategic and comprehensive vision.

After each scenario, the system automatically generates detailed reports that serve as immediate feedback that allows the student and lecturer to measure the abilities, strengths, and weaknesses of the participant.


Schedule Appointment

Fill out the form below, and we will be in touch shortly.

לא הצלחנו לאתר את הטופס.