КОНТАКТ
ул. „Руѓер Бошковиќ“ бр. 18 П. фах 574 – Скопје,
[email protected]
(02) 3099 191 и (02) 3062 224
Back

Networks and Endpoint Security

This course provides the network and system administrators a practical skills required to take into consideration security aspects in design IT networks, helps establishing hardening procedures on corporate endpoints (workstations, laptops, mobile devices), and craft enforceable BYOD policies. The course it has hands‑on labs and real‑world case studies from which participants will learn to prevent, detect, and respond to threats across today’s diverse enterprise environments.

Course Overview Table
Chapter Details
Partner Military Academy General Mihailo Apostolski – Skopje
Title Networks and Endpoint Security
Service Cybersecurity
Target Group Technical personnel, network admins, server admins, IT support engineers
Format In-Person Training with labs (optionally hybrid/virtual)
Focused on Key Technologies Network segmentation, firewalls, VPN, EDR, zero-trust, BYOD frameworks
Status Ready to offer
Stakeholders from SME/PA Side IT departments in SMEs, public agencies, managed service providers
Requirements for Participation Working knowledge of TCP/IP, Windows/Linux administration, basic security concepts
Estimated Duration Two-day (approximately 16  hours)
Description of the Course

Introduction

Modern organizations rely on distributed networks and a growing mix of managed and personal devices. This course provides technical staff with actionable guidance to secure network infrastructure, lock down endpoints, and implement a robust Bring-Your-Own-Device (BYOD) program without sacrificing productivity.

Technical Context and Examples

Participants will get familiarized in configuring network segmentation in lab topologies, deploying endpoint protection agents, and walk through real BYOD onboarding scenarios. Case studies will illustrate how misconfigured devices or flat networks led to breaches—and how layered controls would have prevented them.

Detailed Explanation of Core Concepts

  • Architecture design, VLANs & subnetting, zero‑trust segmentation, VPN & remote access hardening, firewall rule best practices
  • OS hardening (Windows, macOS, Linux, Android, iOS), EDR/EPP deployment, , disk encryption, secure mobile configuration profiles
  • Device management, data‑loss prevention (DLP) for personal devices
  • Log aggregation, SIEM basics, alert triage, incident response playbooks for endpoint and network events

Tentative agenda of the course

  • Course Introduction
  • Module 1: Designing a Secure Network
  • Module 2: Hardening Corporate Endpoints
  • Module 3: Mobile & Remote Device Security
  • Module 4: BYOD Program Development
  • Module 5: Monitoring, Incident Response & Compliance
  • Final Exam: Practical Assessment
Conclusion and Unique Value:

Graduates leave with a blueprint for building secure, segmented networks, enforcing consistent endpoint protection across PCs and mobile devices, and rolling out BYOD without introducing unmanaged risk. The blend of policy creation, technical configuration, and incident-response practice ensures skills translate directly today-to-day operations.

Additional Course Information

Category Details
Developed skills Participants will acquire knowledge and skills, including:
●       Network architecture design with security-first principles

●       Endpoint hardening and EDR deployment

●       Mobile device management & BYOD governance

●       Log analysis and first-responder actions during incidents

Learning Methods Used ●       Lectures and white-board walkthroughs

●       Guided hands-on labs and simulations

●       Group discussions of breach case studies

References/Resources ●       NIST SP 800-207 (Zero Trust Architecture)

●       CIS Benchmarks for Windows, macOS, Linux, Android, iOS

●       ISO/IEC 27001 controls relevant to BYOD and endpoint security

●       Vendor docs for leading EDR and MDM platforms

Overview Slides /