Information Technology and Security for Technical

ITT Course Introduction

Now a day the Organization drive business with Information Technology (IT) also Information Security is concerned for most organization, Component of Technical Information Security are Network, System, Application it’s network infrastructure that need to be secured.
The Information Security is on top of Information Technology (IT) but most IT Peoples does not know cover Information Technology (IT) skills, that will be problem to understand Information Security Concept and Technical Hands-on.
This Course will look at basic skill of Information Technology (IT) technical skill such as Networking Skill, System Skill, Application Skill and overview Information Security concept to be base knowledge of Technical Information Security, Penetration Testing and Digital Forensics.

ITT Course Objectives

  • To Understand Information Technology (IT) Basic Knowledge for Information Security
  • To Understand Overall of Networking Skill (Switching, Routing, etc.)
  • To Understand Overall of System Skill (Windows, Linux)
  • To Hands-on System Administration Skill
  • To Understand Technical Basic of Information Security.

Target Group

  • System engineer
  • Network engineer

Course Outline of ITT

Module 1: Network Administration Fundamentals

  • Basic TCP/IP
  • Basic IPv4 and IPv6
  • Network Protocol
    • Network Protocols: SLIP; PPP; ARP; RARP; IGMP; ICMP; SNMP, HTTP
    • TCP, UDP: Attacks and Countermeasures
    • FTP, TFTP, TELNET, SMTP: Vulnerabilities
  • Network Devices Administration
    • Configuring Cisco Switch Feature
    • Configuring Cisco Router Feature
  • TCP/IP Analysis
    • TCP/IP Analysis Tools
    • Basic using Protocol Analyzer (TCPDump, WinDump, Wireshark) Tools
  • Network Security Concept
    • Network Security Threats
    • Need for Network Security
    • Network Monitoring Concept
Module 2: Microsoft Windows Configuration Fundamentals
  • Using and Creating Microsoft Management Consoles
  • Terminal Services and Remote Desktop Configuration
  • Using Event Viewer and Task Manager
  • Managing Groups, User and Computer Account
  • NTFS File System Permissions
  • Active Directory
Module 3: Linux/Unix Configuration Fundamentals
  • System Startup and Shutdown
  • Understanding the boot sequence
  • The Grand Unified Bootloader
  • GRUB Configuration File
  • The init process
  • The sysvinit startup
  • Linux Directory Layout
  • Linux Filesystems
  • Understanding Linux Processes
  • Linux User and Group Account Management
  • Linux Networking
  • Linux Basic Command line
Module 4: Firewalls
  • What is Firewall
  • Type of Firewall
  • Firewall Features
  • What is DMZ
  • Packet Filtering and Stateful Inspection Firewall
  • Configuring Firewall (Software Firewall & IPTables)
Module 5: Intrusion Detection System & Intrusion Prevention System
  • What is IDS & IPS
  • Type of IDS & IPS
  • Host-Based and Network-Based
  • IDS Detection Methods; Types of Signatures
  • IDS & IPS Tools
    • Snort IDS
    • Bro IDS
    • Sguil
    • OSSEC
Module 6: Wireless LAN Security Fundamentals
  • Wireless Concepts
  • 802.11 Types
  • Core Issues with 802.11
  • Other Types of Wireless
  • Channels
  • Access Point
  • Wireless LAN Security
Module 7: Web Application Security Fundamentals
  • The Evolution of Web Applications
  • Web Application Technologies
    • HTTP Protocol
    • HTTP Headers
    • HTTP Method
    • URL
  • Web Server Technologies
  • Client Side Function
  • Server Side Function
  • Introduction Web Application Threats

28-31 October,1 November 2024

Course Level



5 Days

Tuition Fee

29,000.00 THB


A.Songpon Nakharacruangsak
SEC+, Linux+

Our website uses both essential and non-essential cookies to analyze use of our products and services. This agreement applies to non-essential cookies only. By accepting, you are agreeing to third parties receiving information about your usage and activities. If you choose to decline this agreement, we will continue to use essential cookies for the operation of the website. View Policy