Network Security

Information Security Fundamentals Training

Network Security

Information Security Fundamentals Training

Overview

This course provides a clear and practical introduction to the essentials of information security.
It covers core concepts like authentication methods, access controls, common network attacks (DoS, spoofing, malware), infrastructure defenses (firewalls, IDS, VPNs), wireless security, web server protection (IIS 7), IPSec configuration, and Public Key Infrastructure (PKI) basics β€” all explained in simple steps with real-world examples.
Perfect for beginners, IT support professionals, or anyone starting in cybersecurity who wants to understand threats, defenses, and key technologies used to protect networks, servers, and data.

Key Features

🌐 Easy-to-follow basics of information security, authentication, and access control

πŸ”’ Covers real threats: DoS/DDoS, spoofing, malware types (viruses, worms, trojans, rootkits), phishing, SQL injection

πŸ›‘οΈ Infrastructure protection: Firewalls, IDS/IPS, honeypots, VPNs, DMZ, wireless security (WEP/WPA)

⚑ Hands-on focus: IIS 7 installation & securing, IPSec policies in Windows 2003, basic PKI setup (CA hierarchy, certificates)

πŸ“‘ Explains symmetric/asymmetric encryption, digital certificates, and certificate authorities

😊 Beginner-friendly – uses simple explanations, no heavy technical background needed at start

πŸš€ Builds strong foundation for further certifications like CompTIA Security+, CEH basics, or entry-level security roles

Course Content

  • Introduction to information security
  • Authentication methods (Kerberos, CHAP, Biometric, Token, MFA)
  • Access control models (DAC, MAC, RBAC)
  • Auditing basics (including Windows 2003)
  • Common network attacks (DoS/DDoS, SYN, Sniffer, MITM, Spoofing, Phishing, SQL Injection)
  • Malware types (Adware, Keyloggers, Viruses, Worms, Trojans, Rootkits)
  • Basic defenses against attacks
  • Firewalls, routers, hubs, switches, modems
  • Remote Access Services (RAS), VPNs
  • Intrusion Detection Systems (IDS), difference from firewalls
  • Honeypots (low/high interaction), HoneyClients
  • Network protocol analyzers (sniffers), detection methods
  • Network Access Control (NAC), DMZ
  • Securing workstations/servers
  • Wireless security (802.11 standards, WEP/WPA, common attacks)
  • Email security basics
  • Importance of web server security
  • How web servers work and IIS 7 introduction
  • Installing IIS 7 on Windows 2008 Server
  • Securing access, directories, virtual directories
  • IP/domain restrictions, MIME types
  • Authentication & authorization options in IIS 7 (Basic, Windows Authentication)
  • What is IPSec? Security Association, SPI
  • Transport vs Tunnel mode
  • Authentication Header (AH) vs Encapsulating Security Payload (ESP)
  • IPSec features in Windows 2003
  • Creating and assigning IPSec policies, rules, filters
  • Configuring integrity/encryption algorithms for secure traffic (e.g., Telnet)
  • Symmetric vs Asymmetric encryption and algorithms
  • Public Key Cryptography basics
  • Digital certificates and PKI overview
  • Certificate Authority (CA), internal vs external CAs
  • CA hierarchy and Windows 2003 Certificate Services
  • Installing stand-alone root CA, enterprise subordinate CA
  • Submitting/importing certificates and building trust

Course Objectives

After completing this course, you will be able to:

  • 🧠 Explain core information security concepts, authentication types (Kerberos, CHAP, Biometric, MFA), and access control models (DAC, MAC, RBAC)
  • πŸ” Identify major network attacks (DoS, DDoS, spoofing, MITM, malware) and basic ways to reduce their impact
  • πŸ“€Understand and describe infrastructure security tools: firewalls, IDS, honeypots, VPNs, NAC, DMZ
  • βš™οΈ Secure wireless networks, email, and web servers (IIS 7 authentication, virtual directories, restrictions)
  • 🌿 Configure basic IPSec policies for secure communication (AH/ESP, transport/tunnel modes) in Windows environments
  • πŸ” Describe symmetric/asymmetric encryption, digital certificates, PKI components, and simple CA setup
  • πŸ“ˆ Recognize auditing, auditing in Windows, and best practices for protecting workstations/servers
  • πŸš€ Gain confidence in explaining security threats and defenses in interviews or team discussions

Job Opportunities After Completing the course

This course prepares you well for entry-level IT/security roles, especially in Tokyo/Japan or global markets (2026):

  • πŸ›‘οΈ Junior Information Security Analyst
  • πŸ”’ IT Security Support Technician
  • 🌐 Network Administrator (Security Awareness)
  • πŸ–₯️ Helpdesk / SOC Analyst (Tier 1 – Monitoring)
  • πŸ”§ Cybersecurity Trainee / Apprentice
  • πŸ“‘ Infrastructure Support Engineer (with security focus)
  • ☁️ Entry-Level Cloud Security Associate

In Tokyo area, starting salaries for these roles often range from Β₯3.8–5.5M JPY (higher with experience or certifications like CompTIA Security+). Many companies (telecom, finance, IT services) look for people with solid security basics.