STELLIETECH
  • Home
  • Information
    • FAQ
    • Blog
    • About us
  • Courses
    • Microsoft Office Courses >
      • Microsoft Word
      • Microsoft Word Expert
      • Microsoft Excel
      • Microsoft Excel Expert
      • Microsoft Access
      • Microsoft Access Expert
      • Microsoft Outlook
      • Microsoft PowerPoint
    • Adobe Suite Courses >
      • Adobe After Effects
      • Adobe Dreamweaver
      • Adobe Illustrator
      • Adobe InDesign
      • Adobe Photoshop
      • Adobe Premiere Pro
    • IT Specialist >
      • HTML 5 Application Development
      • Cloud Computing
      • Computational Thinking
      • Device Configuration and Management
      • HTML and CSS
      • Python Course
      • Java Course
      • Javascript Course
      • Network Security
      • Networking Course
      • Databases Course
    • Introduction to Computers >
      • Typing Course
      • Computer Literacy
      • Digital Literacy
    • Office Administration
    • CompTIA Courses >
      • CompTIA Security+ Course
      • CompTIA Network+ Course
      • CompTIA A+ Course
    • Cyber Security >
      • Ethical Hacking Associate (EC-Council)
    • Health and Safety Courses >
      • Working at Heights
      • Health and Safety Representative
      • Covid-19 Workplace Readiness
    • MTA Courses >
      • MTA - Cloud Fundamentals
      • MTA - Database Administration Fundamentals
      • MTA - HTML5 Application Development Fundamentals
      • MTA - Introduction to Programming using Java Course
      • MTA - Introduction to Programming using JavaScript Course
      • MTA - Introduction to Programming using HTML and CSS Course
      • MTA - Mobility and Devices Fundamentals
      • MTA - Networking Fundamentals
      • MTA - Security Fundamentals
      • MTA - Software Development Fundamentals
      • MTA - Windows Operating System Fundamentals
  • Certify
    • Exams
    • Practice Tests
  • E-learning
    • Learn Online
    • Course Creation
    • Custom E-learning
    • Virtual event hosting
  • Contact
    • Request a Quote

IT Specialist: ​Network Security Course

View Course
Picture
Picture
Duration:
​Course: 3 Days 
+ 1 day for Internationally Certified Exam
Pricing:
​​​Course Price: R 3465.00 per person excl VAT
​Exam Price: R850 with re-write excl VAT (Optional)
Certificate of Training:
1 x StellieTech Certificate of Completion
1 x Internationally Accredited E-Certificate
Recommended Prerequisite 
Learners are required to have knowledge, comprehension and application of English at Grade 10 or equivalent. Computer literacy
Venue:
​Stellenbosch Academy (Address)​
OR Online Training (
100% Remote)
​

Times:
​​Monday - Friday 09:00 - 16:00
Follow Up Courses:
IT Specialist Networking Course
​IT Specialist HTML and CSS course 

​
Official Exam:
Internationally Accredited Microsoft Office Specialist Exam
Preparation: 
Assessment, Simulation, and Video's. 
​​
Picture
  • Course Overview
  • Detailed Course Outline
  • Why Get Certified
<
>

IT Specialist Network Security Course

Click here to Download COurse PDF
The IT Specialist Network Security course helps validate one's foundational security knowledge and skills. Topics covered include: Threats and Risk Impacts, Access Control, Device Security, Unsecure Authentication Protocols, Operation System and Software Updates, Stateful and Stateless Inspection, Spoofing, Phishing, and Pharming, and many more. Furthermore, this course covers the material on the IT Specialist Network Security Internationally Accredited Certification Exam, and will help anyone looking to improve their employability prospects in the areas of designing and building webpages.

How does it work?

Our courses are fully facilitated and self paced, and can either be done at our training center or 100% remote (online). Upon successfully completing the course, you will receive a Certificate of Achievement from StellieTech and thereafter, you will be preparing to write the Internationally Accredited Certification Exam which you can book with your StellieTech Course Facilitator/Trainer. The exam can be done at the training center, or 100% remote (online). Should you pass your exam, you will be awarded the Internationally Accredited Certified Exam Certificate which you will receive from the certifying body: Certiport.
​WHEN DOING THE COURSE ONLINE
All you need is a laptop / desktop computer with a stable internet connection. You will receive an online enrolment document via email with your username and password as well as the web address where you will be accessing the course from. The enrolment document also outlines how the course is structured and how to navigate through the course. You will have access to our dedicated support team who will be ready and available should you require any assistance.
WHEN DOING THE COURSE AT OUR TRAINING CENTER
You will be stationed at a desk with a computer that is already set up with the course material so you won’t need to bring a laptop. You will have access to a dedicated facilitator/ trainer that will assist you throughout your training. There is a coffee/ tea station (canteen area) and a coffee shop nearby where you’ll be able to get lunch. Training is from 09h00 – 16h00. Courses can be done consecutively or one day a week.

Each Course Includes

  • Video-based Instructions
  • Exercise Labs
  • Pre- and Post Assessments
  • Flash Cards in addition to PDF Workbooks. The workbooks includes fill-in-the blanks, glossary terms and definitions and many other resources to reinforce learning.

Benefits

  • Defense in Depth
  • Operating System Security
  • Network Device security
  • Secure Computing​
  • Internationally Accredited Exam and many more
Picture
Upon successfully completing the exam​
  • You will receive the Internationally Accredited Exam Certificate which gets sent to you directly from the certifying body: Certiport.
  • StellieTech will email you your E-Certificate and Score Report.
  • You will receive an "Acclaim" badge which can be added to your LinkedIn profile to prove that you are certified.
Core Security Principles
  • Confidentiality
  • Integrity, Availability
  • Threats and Risk Impacts
  • Risk Register
  • Principle of Least Privilege
  • Attack Surfaces, Threat Modeling
  • Physical Security
  • Site Security
  • Computer Security, Removable Drives
  • Access Control, Device Security
  • Mantraps
Security Policy Types
  • Administrative and Technical Controls
Malware
  • Buffer Overflow
  • Viruses, Worms, and Trojan Horses
  • Spyware, Ransomware, Adware
  • Rootkits
  • Backdoors, Zero Day Attacks
  • DoS Attacks
  • Common Attack Methods
  • Vulnerability Types, XSS, SQL Injection
  • Brute Force, MITM, and MITB Attacks
  • Social Engineering
  • Keyloggers (Software and Hardware)
  • Logic Bombs
Backup and Restore Types
  • Full
  • Differential
  • Incremental
Client and Server Protection
  • Separation of Services 1
  • Separation of Services 2
  • Hardening
  • Patch Management
  • Reduce the Attack Surface
  • Group Policy (gpupdate and gpresult)
  • Keep Servers Updated
  • Secure Dynamic DNS Updates
  • Unsecure Authentication Protocols
  • Read-Only Domain Controllers
  • Antivirus
  • Unwanted Installation Protection and UAC
  • Operating System and Software Updates
  • Encrypt Offline Folders
  • Software Restriction Policies 1
  • Software Restriction Policies 2
User Authentication
  • Multifactor Authentication
  • Password Complexity
  • Remote Access
  • Smart Cards
  • RADIUS
  • Biometrics
  • Administrative Tasks
  • Domain and Local User and Group Creation
Permissions
  • File System Permissions 1
  • File System Permissions 2
  • Share Permissions
  • Registry 1
  • Registry 2
  • Active Directory 1
  • Active Directory 2
  • Permission Inheritance
  • Permissions When Copying or Moving Files 1
  • Permissions When Copying or Moving Files 2
  • Multiple Groups and Permissions
  • Basic and Advanced Permissions
  • Take Ownership
  • Delegation
  • Permissions in Linux
Audit Policies
  • Auditing Types
  • What Can Be Audited
  • Enable Auditing
  • What to Audit
  • Save Audit Information
  • Secure Audit Information
Encryption
  • EFS 1
  • EFS 2
  • Moving and Copying EFS Files
  • Drive Encryption
  • Hardware and Software-Based Encryption
  • Mail Encryption
  • Secure Communication Processes
  • VPN
  • Public and Private Keys
  • Encryption Algorithms
  • Certificate Properties
  • Certificate Services
  • PKI
  • Token and Lock Down Devices
Wireless Security
  • Security Types 1
  • Security Types 2
  • SSIDs, MAC Filters
  • Default Configuration (OOBE)
Dedicated Firewalls
  • Firewalls and Their Characteristics
  • Hardware Firewalls
  • Software Firewalls
  • Network vs. Host Firewalls
  • Stateful and Stateless Inspection
  • Security Compliance Manager
  • Security Baselines
  • IDS and IPS
  • Security Information and Event Manager (SIEM)
  • Content Filtering
  • Blacklisting/Whitelisting
Network Isolation
  • Routing 1
  • Routing 2
  • Routing 3
  • Honeypot
  • Perimeter Networks
  • Network Address Translation
  • VPN and IPsec
  • Server and Domain Isolation
  • Air Gap Network, DirectAccess
  • Virtual LAN (VLAN)​
Protocol Security
  • Protocol Spoofing
  • IPsec, Tunneling, and DNSSEC
  • Network Sniffing
  • Well-Known Ports
Email Protection
  • Antivirus 1
  • Antivirus 2 ​
Understand Email Protection
  • Antispam and Antivirus 1
  • Antispam and Antivirus 2
  • Spoofing, Phishing, and Pharming
  • Client and Server Protection
  • SPF Records
  • PTR Records
  • User Training
Browser Security
  • Browser Settings, Cache Management
  • Private Browsing
Install and Configure Antimalware and Antivirus Software
  • Install, Uninstall, Reinstall
  • Update
  • Remediation and Schedule
  • Investigate Alerts
  • Final Test Tips 1
  • Final Test Tips 2
​​
In a world where competition for jobs, pay increases, and academic success continues to increase, certifications offer hope because they are a credible, third-party assessment of one’s skill and knowledge for a given subject.
​

The Information Technology Specialist program is a way for students validate entry level IT skills sought after by employers. The IT Specialist program is aimed at candidates who are considering or just beginning a path to a career in information technology. Students can certify their knowledge in a broad range of IT topics, including software development, database administration, networking and security, mobility and device management, and coding.


Candidates for this exam will demonstrate that they can recognize, write, and debug JavaScript code that will logically solve a problem.

Some of the key benefits of certification include:

  • Validation of knowledge
  • Increased marketability
  • Increased earning power
  • Enhanced academic performance
  • Improved reputation
  • Enhanced credibility
  • Increased confidence
  • Respect from peers
Picture

    Request A Quote

Submit
Picture
Investing in South Africa's future: 
​“South African employers need a workforce that is skilled, adaptable, creative, and equipped for success in the global marketplace.” 

Powered by Create your own unique website with customizable templates.
  • Home
  • Information
    • FAQ
    • Blog
    • About us
  • Courses
    • Microsoft Office Courses >
      • Microsoft Word
      • Microsoft Word Expert
      • Microsoft Excel
      • Microsoft Excel Expert
      • Microsoft Access
      • Microsoft Access Expert
      • Microsoft Outlook
      • Microsoft PowerPoint
    • Adobe Suite Courses >
      • Adobe After Effects
      • Adobe Dreamweaver
      • Adobe Illustrator
      • Adobe InDesign
      • Adobe Photoshop
      • Adobe Premiere Pro
    • IT Specialist >
      • HTML 5 Application Development
      • Cloud Computing
      • Computational Thinking
      • Device Configuration and Management
      • HTML and CSS
      • Python Course
      • Java Course
      • Javascript Course
      • Network Security
      • Networking Course
      • Databases Course
    • Introduction to Computers >
      • Typing Course
      • Computer Literacy
      • Digital Literacy
    • Office Administration
    • CompTIA Courses >
      • CompTIA Security+ Course
      • CompTIA Network+ Course
      • CompTIA A+ Course
    • Cyber Security >
      • Ethical Hacking Associate (EC-Council)
    • Health and Safety Courses >
      • Working at Heights
      • Health and Safety Representative
      • Covid-19 Workplace Readiness
    • MTA Courses >
      • MTA - Cloud Fundamentals
      • MTA - Database Administration Fundamentals
      • MTA - HTML5 Application Development Fundamentals
      • MTA - Introduction to Programming using Java Course
      • MTA - Introduction to Programming using JavaScript Course
      • MTA - Introduction to Programming using HTML and CSS Course
      • MTA - Mobility and Devices Fundamentals
      • MTA - Networking Fundamentals
      • MTA - Security Fundamentals
      • MTA - Software Development Fundamentals
      • MTA - Windows Operating System Fundamentals
  • Certify
    • Exams
    • Practice Tests
  • E-learning
    • Learn Online
    • Course Creation
    • Custom E-learning
    • Virtual event hosting
  • Contact
    • Request a Quote