Network Security Training in South Africa

  • Learn via: Classroom / Virtual Classroom / Online
  • Duration: 2 Days
  • Price: Please contact for booking options
We can host this training at your preferred location. Contact us!

Since all applications today heavily rely on communications and networks, there is no application security without network security. 

This course focuses on network security with a software security viewpoint, and discusses common network attacks and defenses on different OSI layers, with an emphasis on application layer issues, tackling topics like session management or denial of service.

As cryptography is a critical aspect of network security, the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement are also discussed. Instead of presenting an in-depth mathematical and theoretical background, these elements are discussed from a merely practical, engineering perspective, showing typical use-case examples and practical considerations related to the use of crypto, such as public key infrastructures. 

There are no prerequisites for this course.

Network engineers and developers.

  • Understand basic concepts of security, IT security and secure coding
  • Learn about network attacks and defenses at different OSI layers
  • Have a practical understanding of cryptography
  • Understand essential security protocols
  • Understand some recent attacks against cryptosystems
  • Get information about some recent related vulnerabilities
  • Get sources and further readings on secure coding practices

  • IT security and secure coding
  • Network security
  • Practical cryptography
  • Security protocols 
  • Cryptographic vulnerabilities
  • Knowledge sources




Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our South Africa facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

20 January 2025 (2 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
21 January 2025 (2 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
05 February 2025 (2 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
20 January 2025 (2 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
21 January 2025 (2 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
18 February 2025 (2 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
05 February 2025 (2 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
18 February 2025 (2 Days)
Cape Town, Durban, Johannesburg
Classroom / Virtual Classroom
Network Security Training Course in South Africa

Formerly known as Union of South Africa, now officially known as Republic of South Africa is the Southernmost country in Africa. South Africa's population is over 60 million people, which makes the country the world's 23rd-most populous nation. South Africa has three capital cities: executive Pretoria, judicial Bloemfontein and legislative Cape Town, while the largest city is Johannesburg. The official languages of South Africa are Afrikaans, English, Ndebele, Pedi, Sotho, Swati, Tsonga, Tswana, Venda, Xhosa and Zulu.

South Africa can be rainy from November to February, so the best time to visit South Africa is from May to September. Despite the rainy season South Africa is a year-round destination, with varying regional climates. Blyde River Canyon, Durban, Drakensberg, Kruger National Park and of course, Cape Town are the tourist attractions of the country.

Expand your IT knowledge with our comprehensive range of courses, including programming, software development, business skills, data science, cybersecurity, cloud computing and virtualization. Our skilled instructors will facilitate hands-on training and share practical insights, all conveniently conducted at your preferred location within South Africa.
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.