Introduction to network security - course RUB 10,990. from Specialist, training, Date: May 20, 2023.
Miscellaneous / / December 05, 2023
A unique professional in terms of qualifications and experience, a leading teacher in the field of Computer Network Security.
He was the first in Russia to receive the status of an authorized instructor in ethical hacking. He is a member of the “Circle of Excellence” of ethical hacking instructors and has the status of Licensed Penetration Tester (Master). In his classes there is an atmosphere of a real celebration of knowledge, experience and skill. Listeners are delighted - read the reviews and see for yourself!
Holder of 50 prestigious international certifications, including 30 certifications in information security and ethical hacking. Master of Ethical Hacking and Penetration Testing (Licensed Penetration Tester Master). Offensive Security Certified Professional (OSCP) and Security Certified Program (SCP). Microsoft Certified Security Engineer (MCSE: Security) and certified instructor for EC-Council, Microsoft and CryptoPro.
Under the leadership of Sergei Klevogin, the team of the Specialist Center reached the finals of the World CyberOlympic Games 2015, where they won the Olympic award of Champions of the Region!
Regularly participates and conducts master classes at international conferences and forums on information security - Black Hat, Hacker Halted, OWASP AppSec, Positive Hack Days. Author and presenter of free seminars on hacking techniques and penetration testing.
Sergey Pavlovich has experience as a programmer in the Ministry of Defense of the Russian Federation, an information security inspector in the Central Bank of the Russian Federation, head of the Information Technology Department in a commercial bank, teacher at the Moscow Economic and Statistical Institute Institute. Sergei Pavlovich’s experience is very valuable in that it demonstrates both professional mastery of IT products and principles, and an understanding of the integration of business processes with information technologies. And most importantly, Sergey Pavlovich shares his experience and can talk about complex technologies simply and clearly.
During his classes, Sergei Pavlovich combines an explanation of theoretical material with a demonstration of setting up various components of the system. The material is supplemented with details that often go beyond the scope of the course (a joke, an unexpected entertaining question, a funny computer trick).
You can find examples at the link: Hacking video.
A unique specialist, a talented teacher, leading teacher of the Center and head of the “PC Setup and Repair” direction. He trained more than 6,000 students and always received the most flattering reviews from them. Possessing innate intelligence and tact, he presents educational material competently and intelligibly, and generously shares his wealth of experience in the operation and maintenance of computer equipment.
In enthusiastic reviews from Nikolai Mikhailovich’s grateful listeners, they repeat with enviable frequency words such as “The best teacher I have ever met in my life” and “I wish there were more of them teachers!
In 1979 he graduated with honors from Moscow State Technical University named after N.E. Bauman. Since that time, Nikolai Mikhailovich has been working in the computer laboratory of MSTU, and since 1988 he has been in charge of it.
Nikolai Mikhailovich’s professional and teaching experience is truly enormous. He was involved in consulting technical department specialists in preparation for passing the A+ Certification tests of Kombelga-Golden Telecom.
Nikolai Mikhailovich began teaching 37 years ago at the department of Moscow State Technical University named after N.E. Bauman, where he conducted coursework and diploma design. “Specialist” has been teaching at the training center for over 24 years.
Certifications:
» Teacher's articles:
Module 1. Basic Security Terms and Concepts - The student will gain a basic understanding of the terminology used when discussing network security. (2 ac. h.)
-Threats
-Vulnerabilities
-Risks
-Attacks
-Hackers and burglars
-Social engineering
-Checking the system for protection against phishing
-Setting your browser to detect unsafe sites
Module 2. Key concepts and technologies of information security - the student receives information about methods and tools for ensuring security (2 ac. h.)
-Basic principles of protection
-confidentiality
-integrity
-availability
-Authentication Password authentication Two-factor authentication Biometrics Smart card
-Password authentication
-Two-factor authentication
-Biometrics
-Smart card
-Principles of Authorization Rights and Permissions Principle of Least Privilege Separation of Duties
-Rights and permissions
-Principle of least privilege
-Segregation of duties
-Cryptography Encryption Symmetric Encryption Asymmetric Encryption Hashing Digital Signatures Digital Certificates Public Key Infrastructure (PKI)
-Encryption Symmetric encryption Asymmetric encryption
-Symmetric encryption
-Asymmetric encryption
-Hashing
-Digital signatures
-Digital certificates
-Public Key Infrastructure (PKI)
-Encryption of files and folders. Encryption File System - EFS
Module 3. Fundamentals of network security - the student becomes familiar with the basic concepts and technologies of network security (2 ac. h.)
-Basic attacks on network access
-Network security tools Firewall (Firewall) Virtual LAN (VLAN) Demilitarized Zone (DMZ) Proxy Server Network Address Translation (NAT) Virtual Private network (VPN)
-Firewall (Firewall)
-Virtual LAN (VLAN)
-Demilitarized Zone (DMZ)
-Proxy server
-Network Address Translation (NAT)
-Virtual private network (VPN)
-Overview of network security protocols Internet Protocol Security (IPsec) SSL/TLS Protocol Protocol (SSH - Secure Shell)
-Internet Protocol Security (IPsec)
-SSL/TLS protocol
-Protocol (SSH - Secure Shell)
-Setting up a VPN client on Windows
Module 4. Computer protection – the student gets acquainted with the main risks of information security and computer protection methods (2 ac. h.)
-The main risks of information security for a computer user
-Protecting your computer from malware Types of malware Signs of infection Using antivirus software
-Types of malware
-Signs of infection
-Use of antivirus software
-Installing software updates
-Use strong passwords
-Creating a user with limited rights
-System and data backup
-Setting up and using Windows Update
-Create a user account in Windows
-Checking the functionality of anti-virus software
-Checking files and websites for viruses online
-Searching for information about the effectiveness of antivirus software on the Internet
This course is a practical career-oriented e-learning solution with an emphasis on practical experience, designed to help students develop specific security skills, as well as critical thinking and problem-solving skills complex tasks. This is a combined program that combines online learning and classroom training. Interesting laboratory tasks in the Packet tracer simulator program are captivating and turn into an entertaining game. Emphasis on a large amount of independent work.
4,2