{"id":53,"date":"2025-11-30T15:22:05","date_gmt":"2025-11-30T15:22:05","guid":{"rendered":"https:\/\/adler-tech.com\/?page_id=53"},"modified":"2026-04-13T15:14:46","modified_gmt":"2026-04-13T14:14:46","slug":"network-defense-and-administration","status":"publish","type":"page","link":"https:\/\/adler-tech.com\/?page_id=53","title":{"rendered":"Network Defense and Administration"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p><strong>Duration:<\/strong> 35 Hours (5 Days) <strong>Focus:<\/strong> Policy Development, Threat Mitigation, and Incident Response<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Day 1: Foundations, Policy, and Protocol Security \ud83d\udcdd<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Module 1: Introduction to Network Security Fundamentals<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Network Context<\/strong> (Review of <strong>Network topology<\/strong>, <strong>Network Types<\/strong>, and the <strong>OSI Model<\/strong>).<\/li>\n\n\n\n<li><strong>Security Policy Core<\/strong> (<strong>What is Security Policy<\/strong>? What Defines a good security policy).<\/li>\n\n\n\n<li><strong>Policy Structure and Implementation<\/strong> (Structuring a security policy, developing and implementing security guidelines).<\/li>\n\n\n\n<li><strong>Policy Efficacy<\/strong> (Defining the <strong>Requirements of Effective Security Policy<\/strong>).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Module 2: Protocol Vulnerabilities and Hardening<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Core Network Protocols<\/strong> (Overview of protocols: SLIP, PPP, ARP, RARP, IGMP, ICMP, SNMP, HTTP).<\/li>\n\n\n\n<li><strong>IP Layer Security<\/strong> (<strong>IP: Attacks and Countermeasures<\/strong>).<\/li>\n\n\n\n<li><strong>Transport Layer Threats<\/strong> (<strong>TCP, UDP: Attacks and Countermeasures<\/strong>).<\/li>\n\n\n\n<li><strong>Application Service Weaknesses<\/strong> (Vulnerabilities in legacy services: FTP, TFTP, TELNET, SMTP).<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Day 2: Threat Landscape, Attacks, and Physical Security \ud83d\udea8<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Module 3: Physical and Environmental Security<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Physical Threats<\/strong> (<strong>Physical Security Threats<\/strong> and implementing preventative measures).<\/li>\n\n\n\n<li><strong>Access Control<\/strong> (<strong>Locks and Keys<\/strong>, <strong>Biometric Devices<\/strong>, and <strong>PC Security: Boot Access<\/strong>).<\/li>\n\n\n\n<li><strong>Emanations Control<\/strong> (Understanding and mitigating <strong>TEMPEST<\/strong> issues).<\/li>\n\n\n\n<li><strong>Fire Safety<\/strong> (<strong>Fire Suppression<\/strong>, <strong>Gaseous Emission Systems<\/strong>, and safety protocols).<\/li>\n\n\n\n<li><strong>Device Protection<\/strong> (<strong>Laptop Security: Physical Security Countermeasures<\/strong>).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Module 4: Network Attack Vectors<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Threat Definitions<\/strong> (Current Statistics, defining key terms: <strong>Threats, Attack and Exploit<\/strong>).<\/li>\n\n\n\n<li><strong>Attacker Classification<\/strong> (<strong>Classification of Hackers and Attacks<\/strong>).<\/li>\n\n\n\n<li><strong>Injection and Manipulation<\/strong> (Web Page Defacement, <strong>SQL Injection<\/strong>, <strong>Buffer Overflow<\/strong>).<\/li>\n\n\n\n<li><strong>Deception and Snooping<\/strong> (Spoofing, Eaves Dropping, Phishing, Wire Tapping).<\/li>\n\n\n\n<li><strong>Wireless Attacks<\/strong> (<strong>War Driving<\/strong>, <strong>War Chalking<\/strong>, <strong>War Flying<\/strong>).<\/li>\n\n\n\n<li><strong>Brute Force<\/strong> (<strong>War Dialing<\/strong>, <strong>Password Cracking<\/strong>).<\/li>\n\n\n\n<li><strong>Availability Attacks<\/strong> (<strong>Denial of Service (DOS) Attacks and Distributed DOS<\/strong>).<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Day 3: Defense Layers: Firewalls, IDS, and Network Hardening \ud83d\udee1\ufe0f<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Module 5: Firewall Architecture and Deployment<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Threat Handling<\/strong> (Handling threats and security tasks, <strong>Protection against hacking<\/strong>).<\/li>\n\n\n\n<li><strong>Firewall Types<\/strong> (<strong>Packet filtering and Stateful Packet Filtering<\/strong>).<\/li>\n\n\n\n<li><strong>Advanced Deployments<\/strong> (Implementing <strong>Multi-layer firewall protection<\/strong> and <strong>Multi firewall DMZ<\/strong>).<\/li>\n\n\n\n<li><strong>Specialized Firewalls<\/strong> (<strong>Specialty firewalls and Reverse firewalls<\/strong>).<\/li>\n\n\n\n<li><strong>Centralization<\/strong> (<strong>Centralization and Documentation<\/strong>).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Module 6: Intrusion Detection and Prevention<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>IDS Characteristics<\/strong> (<strong>Characteristics of IDS<\/strong> and the difference between <strong>Host based IDS Vs Network based IDS<\/strong>).<\/li>\n\n\n\n<li><strong>Detection Methods<\/strong> (<strong>IDS Detection Methods<\/strong> and <strong>Types of Signatures<\/strong>).<\/li>\n\n\n\n<li><strong>Prevention Systems<\/strong> (<strong>Intrusion Prevention System<\/strong> and the key difference between <strong>IDS Vs IPS<\/strong>).<\/li>\n\n\n\n<li><strong>IPS Tools<\/strong> (Overview of <strong>IPS Tool<\/strong> capabilities).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Module 7: Core Network Security Services<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Network Address Translation (NAT)<\/strong> (<strong>Network Address Translation<\/strong> basics and security implications).<\/li>\n\n\n\n<li><strong>Proxying and Gateways<\/strong> (<strong>Application layer gateway and Proxying<\/strong>).<\/li>\n\n\n\n<li><strong>Bastion and Honeypots<\/strong> (<strong>Bastion Host<\/strong>, <strong>Honeypots and Honeynet<\/strong> configuration).<\/li>\n\n\n\n<li><strong>VPN Fundamentals<\/strong> (VPN concepts and the <strong>Authentication process<\/strong>).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Module 8: Router and OS Hardening<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Router Security<\/strong> (Understanding <strong>Internet work Operating Systems (IOS)<\/strong> and <strong>Troubleshooting a router<\/strong>).<\/li>\n\n\n\n<li><strong>Hardening Procedures<\/strong> (<strong>Hardening a Router<\/strong> and its <strong>Components of router security<\/strong>).<\/li>\n\n\n\n<li><strong>Testing Tools<\/strong> (Overview of <strong>Router security: testing tools<\/strong>).<\/li>\n\n\n\n<li><strong>OS Security (Windows)<\/strong> (Objects And Permissions, NTFS File System Permissions, Active Directory, Kerberos Authentication And Security, IP Security).<\/li>\n\n\n\n<li><strong>OS Security (Linux)<\/strong> (Basic Linux hardening techniques).<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Day 4: Application Security, Encryption, and WLAN \ud83d\udd12<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Module 9: Patch and Vulnerability Management<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Vulnerability Assessment<\/strong> (<strong>Vulnerability Assessment<\/strong> goals and methodology).<\/li>\n\n\n\n<li><strong>Assessment Tools<\/strong> (<strong>Selecting vulnerability assessment tools<\/strong>).<\/li>\n\n\n\n<li><strong>Patch Management<\/strong> (Red Hat Up2date, Microsoft Patch Management Process and Windows Update Services).<\/li>\n\n\n\n<li><strong>Patch Tools<\/strong> (Using <strong>Qchain<\/strong>, <strong>Microsoft Baseline Security Analyzer<\/strong>, and other <strong>Patch Management Tools<\/strong>).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Module 10: Application and Web Security<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Web Application Security<\/strong> (<strong>Securing Web Applications<\/strong>).<\/li>\n\n\n\n<li><strong>Secure Code<\/strong> (<strong>Writing Secure Code<\/strong> and <strong>Best Practices<\/strong>).<\/li>\n\n\n\n<li><strong>Remote Administration<\/strong> (<strong>Remote Administration Security<\/strong>).<\/li>\n\n\n\n<li><strong>Web Defenses<\/strong> (Network Devices and Design, Altering the Network Addresses).<\/li>\n\n\n\n<li><strong>Client\/Browser Security<\/strong> (Client Authorization and Secure Client Transmissions, Browser Security Settings, Malicious Code Detection).<\/li>\n\n\n\n<li><strong>Input Validation<\/strong> (Common Gateway Interface (CGI), Web Application Input Data Validation and Buffer Overflows).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Module 11: Encryption and Confidentiality<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Core Concepts<\/strong> (Maintaining confidentiality, <strong>Firewalls Implementing Encryption<\/strong>).<\/li>\n\n\n\n<li><strong>Cryptography<\/strong> (<strong>Public and Private Keys<\/strong> (including PGP), <strong>Choosing the size of keys<\/strong>).<\/li>\n\n\n\n<li><strong>PKI<\/strong> (<strong>Digital certificates<\/strong> and <strong>Certificate Management Through PKI<\/strong>).<\/li>\n\n\n\n<li><strong>Scheme Analysis<\/strong> (<strong>Analyzing popular encryption schemes including IPSEC<\/strong>).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Module 12: Wireless and Mobile Security<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>WLAN Basics<\/strong> (<strong>Wireless Network Types<\/strong>, <strong>Antenna<\/strong>, <strong>WLAN Standards<\/strong>, BlueTooth And Ultra Wideband).<\/li>\n\n\n\n<li><strong>Legacy Tools<\/strong> (<strong>WEP Description Tool<\/strong> (Air Snort and WEPCrack)).<\/li>\n\n\n\n<li><strong>Modern WLAN Security<\/strong> (<strong>WLAN Security<\/strong>, <strong>WPA<\/strong>, <strong>TKIP<\/strong>, <strong>WTLS<\/strong>).<\/li>\n\n\n\n<li><strong>Authentication<\/strong> (<strong>EAP Methods<\/strong>, <strong>RADIUS<\/strong>, <strong>Multifactor Authentication<\/strong>).<\/li>\n\n\n\n<li><strong>Mobile Security<\/strong> (<strong>Mobile Security Through Certificates<\/strong>).<\/li>\n\n\n\n<li><strong>Encryption Standards<\/strong> (Advanced Encryption Standards (AES), DES, RSA Encryption).<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Day 5: VPNs, E-Mail, Fault Tolerance, and Incident Response \ud83e\ude79<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Module 13: Virtual Private Networks (VPN)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Tunneling Protocols<\/strong> (<strong>VPN Tunneling Protocols<\/strong> overview).<\/li>\n\n\n\n<li><strong>Specific Protocols<\/strong> (Details on <strong>PPTP and L2TP<\/strong>).<\/li>\n\n\n\n<li><strong>VPN Security<\/strong> (<strong>VPN Security<\/strong> best practices).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Module 14: E-Mail Security<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Email Structure<\/strong> (<strong>Components Of An Email<\/strong> and <strong>E-mail protocols<\/strong>).<\/li>\n\n\n\n<li><strong>Risks and Defense<\/strong> (<strong>E-Mail Security Risks<\/strong> and <strong>How to defend against E-Mail security risks<\/strong>).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Module 15: Fault Tolerance and Prevention<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Need for Resilience<\/strong> (Why Create Fault Tolerance, <strong>Reasons For System Failure<\/strong>).<\/li>\n\n\n\n<li><strong>Planning<\/strong> (<strong>Planning For Fault Tolerance<\/strong>).<\/li>\n\n\n\n<li><strong>Implementation<\/strong> (<strong>Network Security: Fault Tolerance<\/strong>).<\/li>\n\n\n\n<li><strong>Measures<\/strong> (<strong>Preventive Measures<\/strong>).<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Module 16: Incident Handling and Disaster Recovery<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Incident Definition<\/strong> (<strong>What Is an Incident<\/strong> and <strong>What Is an Incident Response<\/strong>).<\/li>\n\n\n\n<li><strong>Response Team<\/strong> (<strong>Incident Response Team<\/strong>).<\/li>\n\n\n\n<li><strong>Handling Procedure<\/strong> (<strong>Step by Step Procedure<\/strong> for <strong>Managing Incidents<\/strong>).<\/li>\n\n\n\n<li><strong>PICERF Methodology<\/strong> (<strong>Six Step Approach for Incident Handling<\/strong>).<\/li>\n\n\n\n<li><strong>Recovery Planning<\/strong> (<strong>What is a Disaster Recovery<\/strong>, <strong>Disaster Recovery Planning<\/strong>).<\/li>\n\n\n\n<li><strong>Business Continuity<\/strong> (<strong>Business Continuity Planning Process<\/strong>).<\/li>\n\n\n\n<li><strong>Prevention<\/strong> (<strong>Disaster Prevention<\/strong>).<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Duration: 35 Hours (5 Days) Focus: Policy Development, Threat Mitigation, and Incident Response Day 1: Foundations, Policy, and Protocol Security \ud83d\udcdd Module 1: Introduction to Network Security Fundamentals Module 2: Protocol Vulnerabilities and Hardening Day 2: Threat Landscape, Attacks, and Physical Security \ud83d\udea8 Module 3: Physical and Environmental Security Module 4: Network Attack Vectors Day [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":22,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-53","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Network Defense and Administration - ADLER-TECH<\/title>\n<meta name=\"description\" content=\"Deep dive into network and it&#039;s security. Learn about vulnerabilities of SLIP PP ARP RARP IGMP ICMP SNMP and HTTP and how to secure them\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/adler-tech.com\/?page_id=53\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network Defense and Administration - ADLER-TECH\" \/>\n<meta property=\"og:description\" content=\"Deep dive into network and it&#039;s security. Learn about vulnerabilities of SLIP PP ARP RARP IGMP ICMP SNMP and HTTP and how to secure them\" \/>\n<meta property=\"og:url\" content=\"https:\/\/adler-tech.com\/?page_id=53\" \/>\n<meta property=\"og:site_name\" content=\"ADLER-TECH\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-13T14:14:46+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/adler-tech.com\\\/?page_id=53\",\"url\":\"https:\\\/\\\/adler-tech.com\\\/?page_id=53\",\"name\":\"Network Defense and Administration - ADLER-TECH\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/adler-tech.com\\\/#website\"},\"datePublished\":\"2025-11-30T15:22:05+00:00\",\"dateModified\":\"2026-04-13T14:14:46+00:00\",\"description\":\"Deep dive into network and it's security. Learn about vulnerabilities of SLIP PP ARP RARP IGMP ICMP SNMP and HTTP and how to secure them\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/adler-tech.com\\\/?page_id=53#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/adler-tech.com\\\/?page_id=53\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/adler-tech.com\\\/?page_id=53#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/adler-tech.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trainings\",\"item\":\"https:\\\/\\\/adler-tech.com\\\/?page_id=7\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Networking training\",\"item\":\"https:\\\/\\\/adler-tech.com\\\/?page_id=22\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Network Defense and Administration\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/adler-tech.com\\\/#website\",\"url\":\"https:\\\/\\\/adler-tech.com\\\/\",\"name\":\"ADLER-TECH\",\"description\":\"Best IT trainings, support and bodyleasing\",\"publisher\":{\"@id\":\"https:\\\/\\\/adler-tech.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/adler-tech.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/adler-tech.com\\\/#organization\",\"name\":\"ADLER-TECH\",\"url\":\"https:\\\/\\\/adler-tech.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/adler-tech.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/adler-tech.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/ADLER-TECH_LOGO.png\",\"contentUrl\":\"https:\\\/\\\/adler-tech.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/ADLER-TECH_LOGO.png\",\"width\":361,\"height\":121,\"caption\":\"ADLER-TECH\"},\"image\":{\"@id\":\"https:\\\/\\\/adler-tech.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/110643968\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Network Defense and Administration - ADLER-TECH","description":"Deep dive into network and it's security. Learn about vulnerabilities of SLIP PP ARP RARP IGMP ICMP SNMP and HTTP and how to secure them","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/adler-tech.com\/?page_id=53","og_locale":"en_US","og_type":"article","og_title":"Network Defense and Administration - ADLER-TECH","og_description":"Deep dive into network and it's security. Learn about vulnerabilities of SLIP PP ARP RARP IGMP ICMP SNMP and HTTP and how to secure them","og_url":"https:\/\/adler-tech.com\/?page_id=53","og_site_name":"ADLER-TECH","article_modified_time":"2026-04-13T14:14:46+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/adler-tech.com\/?page_id=53","url":"https:\/\/adler-tech.com\/?page_id=53","name":"Network Defense and Administration - ADLER-TECH","isPartOf":{"@id":"https:\/\/adler-tech.com\/#website"},"datePublished":"2025-11-30T15:22:05+00:00","dateModified":"2026-04-13T14:14:46+00:00","description":"Deep dive into network and it's security. Learn about vulnerabilities of SLIP PP ARP RARP IGMP ICMP SNMP and HTTP and how to secure them","breadcrumb":{"@id":"https:\/\/adler-tech.com\/?page_id=53#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/adler-tech.com\/?page_id=53"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/adler-tech.com\/?page_id=53#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/adler-tech.com\/"},{"@type":"ListItem","position":2,"name":"Trainings","item":"https:\/\/adler-tech.com\/?page_id=7"},{"@type":"ListItem","position":3,"name":"Networking training","item":"https:\/\/adler-tech.com\/?page_id=22"},{"@type":"ListItem","position":4,"name":"Network Defense and Administration"}]},{"@type":"WebSite","@id":"https:\/\/adler-tech.com\/#website","url":"https:\/\/adler-tech.com\/","name":"ADLER-TECH","description":"Best IT trainings, support and bodyleasing","publisher":{"@id":"https:\/\/adler-tech.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/adler-tech.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/adler-tech.com\/#organization","name":"ADLER-TECH","url":"https:\/\/adler-tech.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/adler-tech.com\/#\/schema\/logo\/image\/","url":"https:\/\/adler-tech.com\/wp-content\/uploads\/2026\/04\/ADLER-TECH_LOGO.png","contentUrl":"https:\/\/adler-tech.com\/wp-content\/uploads\/2026\/04\/ADLER-TECH_LOGO.png","width":361,"height":121,"caption":"ADLER-TECH"},"image":{"@id":"https:\/\/adler-tech.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/110643968"]}]}},"_links":{"self":[{"href":"https:\/\/adler-tech.com\/index.php?rest_route=\/wp\/v2\/pages\/53","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adler-tech.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/adler-tech.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/adler-tech.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/adler-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=53"}],"version-history":[{"count":1,"href":"https:\/\/adler-tech.com\/index.php?rest_route=\/wp\/v2\/pages\/53\/revisions"}],"predecessor-version":[{"id":54,"href":"https:\/\/adler-tech.com\/index.php?rest_route=\/wp\/v2\/pages\/53\/revisions\/54"}],"up":[{"embeddable":true,"href":"https:\/\/adler-tech.com\/index.php?rest_route=\/wp\/v2\/pages\/22"}],"wp:attachment":[{"href":"https:\/\/adler-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=53"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}