Introduction to Network and Cybersecurity Learning Kit for the DX Era
KED-IA102 Network Security Learning Kit
This is a "Network & Security" educational learning kit. It includes workshop texts and offers thorough and attentive instruction both online and in-person (with actual transportation costs for remote locations).
You can learn the fundamentals of communication technologies such as the internet, which is the foundation of cloud/SNS and the core of DX promotion, as well as 5G mobile phones and next-generation Wi-Fi. We offer a course that teaches the basics of security through specific examples, including exercises and experiences, providing hints for your company's response. Furthermore, we will introduce the latest security technologies, such as endpoint security (EDR) and human security, to prevent information leaks from increasing ransomware incidents. - Ideal for new employee training in industrial high schools, universities, and companies! - We provide a course that teaches the basics of security through specific examples, including exercises and experiences, offering hints for your company's response. - We will also introduce security technologies such as endpoint security (EDR) to prevent information leaks. - Texts tailored to the instructor can also be edited (optional). - On-site training is available; please consult us. 【Course Overview】 ■ Overview of Information Security ■ Mechanisms of Network Communication ■ Experience Unauthorized Access ■ Network Security Measures ■ Overview of Security Technologies (such as Endpoint Security) *For more details, please feel free to contact us.
Inquire About This Product
basic information
A beginner-friendly text for education, with abundant exercises and materials to deepen understanding. Introduction to Network & Cybersecurity 1. Overview of Information Security - Purpose of Information Security - Introduction to Cases of Unauthorized Access - Latest Trends in Attacks and Countermeasures 2. Mechanisms of Network Communication - Communication Protocols - TCP/IP - IP Addresses - Port Numbers - Domain Names, etc. 3. Experiencing Unauthorized Access - Port Scanning - Targeted Attacks - Social Engineering 4. Network Security Measures - Firewalls - Encryption Technologies 5. Overview of Latest Security Technologies (such as Endpoint Security) - For those wishing to attend lectures, available online or in-person (travel expenses and transportation costs are required) Instructor: Our contracted instructor [Former Network Equipment Manufacturer Engineer] Environment: OS: Windows 10/11, macOS, or Linux (Participants are required to prepare their own PCs for exercises, but rental is available for a fee) Venue: We will accommodate your preferences for on-site visits Online and venue rental options are also available (individual arrangements)
Price information
Network Security Learning Kit Text + Workshop Guidance - Online Course: Conducted via the web, 1 to 3 days course Example: 1-day course, 6 hours × 1 day Up to 5 participants: 100,000 yen Up to 12 participants: 120,000 yen Up to 20 participants: 150,000 yen - For on-site courses, in addition to the seminar fee, travel expenses, transportation costs, and venue fees are required.
Price range
P3
Delivery Time
P4
※Please feel free to contact us.
Applications/Examples of results
This is a training course based on the text of the network security learning kit. - The instructor, who has extensive experience and achievements as a manufacturer engineer in the development of network devices at a major company, will use actual equipment and strive to provide clear explanations. - The environment can be either OS: Windows 10/11, macOS, or Linux (participants are required to prepare their own PCs for exercises, but rental is available for a fee). - Venue: Online On-site support is also available at a location of the customer's choice (individualized support and explanations tailored to the level of the participants).
Detailed information
-
Table of Contents 1. Overview of Information Security 1. Current State of Information Security 2. CIA of Information Security 3. Threats, Incidents, Vulnerabilities, Risks 2. Basics of Networking 1. What is the Internet 2. Packet Switching 3. Clients and Servers 4. About Network Devices 3. Mechanisms of Communication 1. Communication Protocols 2. Hierarchical Structure of Communication and Data Encapsulation 3. OSI Reference Model and TCP/IP Protocol 4. MAC Address / IP Address / Port Number 4. Services on the Network 1. Domain Names and DNS 2. DHCP 5. Network Commands
-
Table of Contents 2 6. Unauthorized Access 1. Threats Hidden in the Network 2. Exploration 3. Port Scanning 7. Targeted Attacks 1. Attacks Using Email 2. Attacks Using WWW Services 3. Social Engineering 8. Network Security Measures 1. Attacks on the Network 2. Firewalls 3. IDS/IPS 4. Proxy Servers 9. Encryption Technologies 1. Eavesdropping, Tampering, Impersonation, Denial 2. What is Encryption? 3. Symmetric Key Encryption 4. Asymmetric Key Encryption 5. Digital Signatures 10. Wireless LAN 1. Wireless LAN Standards 2. Wireless LAN Security
-
Sample of text Data flowing through a hierarchical structure
-
Text Sample IPv4 Address • Uniquely identifies hosts on a network. • Can be changed. • An IP address where the host part is all "0" is the network address, indicating the network itself. • An IP address where the host part is all "1" is the broadcast address.
-
Text sample DHCP
-
Targeted attacks refer to attacks that aim to steal confidential information, intellectual property, and account information (IDs, passwords) from specific organizations. In these attacks, tactics often involve sending emails that mimic the format of communications the target organization frequently engages in, prompting the recipient to click on attached files or links, which then lead them to malware distribution sites.
-
Text sample: Network security measures and content.
-
Text sample Network security measures
catalog(1)
Download All CatalogsCompany information
- Sales/installation/consulting of network equipment - Sales of measuring instruments - Rental of electronic devices, sales of used measuring instruments - Software/hardware development and manufacturing - Educational materials: robotic arms, real-time OS programming learning - Introduction to AI using IoT devices (sensors) (optimal as a practical material for implementing "anomaly detection" using AI) - Security educational materials - Security-related software: DDoS, EDR, authentication, etc.