Networking Course

course overview

Click to View dates & book now


  • This course covers network technology and the business objectives and risks. In particular, it will help you to find out what is important in the world of networking and become familiar with networking terms so you will be able communicate with your network specialists.
  • Please note, this course is designed to impart technical understanding to the delegates. It is not designed to teach audit techniques, standards or remedial plans.


This course is designed for audit and security specialists who need to understand how networks operate, what the sources of risk are and how to manage the risk. Also, the training is particularly relevant to those who manage or are responsible for large corporate networks.


A general familiarity with the use of ICT in businesses, from the viewpoint of a user. You should feel comfortable loading, running and experimenting with software, under guidance from the instructor. You should be able to take in your stride the command line and GUI utilities that are employed on the course.


  • A review of networking technology
  • Network security concepts.
  • Business issues.
  • Network development lifecycle.
  • Network hardware and software.
  • Risks and objectives.
  • Local area networks.
  • TCP/IP.
  • LAN devices.
  • Directory services.
  • Virtual private networks.
  • Transmission system vulnerabilities.
  • General network management.
  • Ports and sockets.
  • Routing.
  • Various hacking and probing tools.
  • WAN technology
  • WAN technology.
  • Frame relay.
  • ATM.
  • ISDN.
  • ADSL.
  • Satellite.
  • Remote access
  • Remote access topologies.
  • Telephone lines.
  • Authenticating remote users – the Shiva corporation.
  • Defending the remote machine.
  • Virtual private networking.
  • Auditing equipment cross the internet.
  • Wireless LANs (WLANs).
  • IP version 6 (IPV6).
  • Traffic control
  • Candidate points of weakness.
  • Standard firewall services.
  • Firewall specimen specification.
  • Firewall deployment.
  • Risk assessment methods.
  • Rule lists and logs.
  • Building a trust infrastructure
  • Business objectives.
  • Types of encryption.
  • Symmetrical cryptography.
  • PGP.
  • Hash check-summing.
  • SSL.
  • Digital Certificates.
  • VPNs.
  • System security checks
  • Top 20 system risks in an e-commerce environment.
  • Detection of vulnerabilities.
  • What the hackers do.
  • Best practice in resisting intrusions.

Talk to an expert

Thinking about Onsite?

If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. Its a cost effective option. One on one training can be delivered too, at reasonable rates.

Submit an enquiry from any page on this site, and let us know you are interested in the requirements box, or simply mention it when we contact you.

All $ prices are in USD unless it’s a NZ or AU date

SPVC = Self Paced Virtual Class

LVC = Live Virtual Class

Please Note: All courses are availaible as Live Virtual Classes

Trusted by over 1/2 million students in 15 countries

Our clients have included prestigious national organisations such as Oxford University Press, multi-national private corporations such as JP Morgan and HSBC, as well as public sector institutions such as the Department of Defence and the Department of Health.