Network Security
Information Security Fundamentals Training
Network Security
Information Security Fundamentals Training
Overview
This course provides a clear and practical introduction to the essentials of information security.
It covers core concepts like authentication methods, access controls, common network attacks (DoS, spoofing, malware), infrastructure defenses (firewalls, IDS, VPNs), wireless security, web server protection (IIS 7), IPSec configuration, and Public Key Infrastructure (PKI) basics β all explained in simple steps with real-world examples.
Perfect for beginners, IT support professionals, or anyone starting in cybersecurity who wants to understand threats, defenses, and key technologies used to protect networks, servers, and data.
Key Features
π Easy-to-follow basics of information security, authentication, and access control
π Covers real threats: DoS/DDoS, spoofing, malware types (viruses, worms, trojans, rootkits), phishing, SQL injection
π‘οΈ Infrastructure protection: Firewalls, IDS/IPS, honeypots, VPNs, DMZ, wireless security (WEP/WPA)
β‘ Hands-on focus: IIS 7 installation & securing, IPSec policies in Windows 2003, basic PKI setup (CA hierarchy, certificates)
π‘ Explains symmetric/asymmetric encryption, digital certificates, and certificate authorities
π Beginner-friendly β uses simple explanations, no heavy technical background needed at start
π Builds strong foundation for further certifications like CompTIA Security+, CEH basics, or entry-level security roles
Course Content
Module 1: Basics of Information Security
- Introduction to information security
- Authentication methods (Kerberos, CHAP, Biometric, Token, MFA)
- Access control models (DAC, MAC, RBAC)
- Auditing basics (including Windows 2003)
- Common network attacks (DoS/DDoS, SYN, Sniffer, MITM, Spoofing, Phishing, SQL Injection)
- Malware types (Adware, Keyloggers, Viruses, Worms, Trojans, Rootkits)
- Basic defenses against attacks
Module 2: Infrastructure and Email Security
- Firewalls, routers, hubs, switches, modems
- Remote Access Services (RAS), VPNs
- Intrusion Detection Systems (IDS), difference from firewalls
- Honeypots (low/high interaction), HoneyClients
- Network protocol analyzers (sniffers), detection methods
- Network Access Control (NAC), DMZ
- Securing workstations/servers
- Wireless security (802.11 standards, WEP/WPA, common attacks)
- Email security basics
Module 3: Internet Information Services (IIS) 7 Security
- Importance of web server security
- How web servers work and IIS 7 introduction
- Installing IIS 7 on Windows 2008 Server
- Securing access, directories, virtual directories
- IP/domain restrictions, MIME types
- Authentication & authorization options in IIS 7 (Basic, Windows Authentication)
Module 4: Internet Protocol Security (IPSec)
- What is IPSec? Security Association, SPI
- Transport vs Tunnel mode
- Authentication Header (AH) vs Encapsulating Security Payload (ESP)
- IPSec features in Windows 2003
- Creating and assigning IPSec policies, rules, filters
- Configuring integrity/encryption algorithms for secure traffic (e.g., Telnet)
Module 5: Public Key Infrastructure (PKI)
- Symmetric vs Asymmetric encryption and algorithms
- Public Key Cryptography basics
- Digital certificates and PKI overview
- Certificate Authority (CA), internal vs external CAs
- CA hierarchy and Windows 2003 Certificate Services
- Installing stand-alone root CA, enterprise subordinate CA
- Submitting/importing certificates and building trust
Course Objectives
After completing this course, you will be able to:
- π§ Explain core information security concepts, authentication types (Kerberos, CHAP, Biometric, MFA), and access control models (DAC, MAC, RBAC)
- π Identify major network attacks (DoS, DDoS, spoofing, MITM, malware) and basic ways to reduce their impact
- π€Understand and describe infrastructure security tools: firewalls, IDS, honeypots, VPNs, NAC, DMZ
- βοΈ Secure wireless networks, email, and web servers (IIS 7 authentication, virtual directories, restrictions)
- πΏ Configure basic IPSec policies for secure communication (AH/ESP, transport/tunnel modes) in Windows environments
- π Describe symmetric/asymmetric encryption, digital certificates, PKI components, and simple CA setup
- π Recognize auditing, auditing in Windows, and best practices for protecting workstations/servers
- π Gain confidence in explaining security threats and defenses in interviews or team discussions
Job Opportunities After Completing the course
This course prepares you well for entry-level IT/security roles, especially in Tokyo/Japan or global markets (2026):
- π‘οΈ Junior Information Security Analyst
- π IT Security Support Technician
- π Network Administrator (Security Awareness)
- π₯οΈ Helpdesk / SOC Analyst (Tier 1 β Monitoring)
- π§ Cybersecurity Trainee / Apprentice
- π‘ Infrastructure Support Engineer (with security focus)
- βοΈ Entry-Level Cloud Security Associate
In Tokyo area, starting salaries for these roles often range from Β₯3.8β5.5M JPY (higher with experience or certifications like CompTIA Security+). Many companies (telecom, finance, IT services) look for people with solid security basics.
