Get in Touch

Course Outline

Module 1: Introduction to Network Security

  • Understanding network topology; distinctions between network types and the OSI Model

Module 2: Network Protocols

  • Core network protocols: SLIP, PPP, ARP, RARP, IGMP, ICMP, SNMP, and HTTP
  • IP: Analyzing attacks and corresponding countermeasures
  • TCP and UDP: Analyzing attacks and corresponding countermeasures
  • Vulnerabilities associated with FTP, TFTP, TELNET, and SMTP

Module 3: Security Policy

  • Defining the concept of a Security Policy
  • Criteria that define a robust security policy
  • Structural components of a Security Policy
  • Strategies for developing and implementing security policies
  • Essential requirements for an effective security policy

Module 4: Physical Security

  • Identifying physical security threats
  • Functionality of locks and keys
  • Understanding TEMPEST
  • Fire safety measures: Fire suppression and gaseous emission systems
  • Laptop security: Physical security countermeasures
  • Utilization of biometric devices
  • PC security: Managing boot access

Module 5: Network Attacks

  • Analysis of current statistics
  • Key definitions: Threats, attacks, and exploits
  • Classification of hackers and attack types
  • Techniques such as spoofing, spamming, eavesdropping, phishing, war dialing, and password cracking
  • Web page defacement, SQL injection, wire tapping, and buffer overflow
  • Wireless techniques: War driving, war chalking, and war flying
  • Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks

Module 6: Intrusion Detection System

  • Key characteristics of IDS
  • Comparing host-based IDS versus network-based IDS
  • IDS detection methods and signature types
  • Introduction to Intrusion Prevention Systems
  • Distinguishing between IDS and IPS
  • Overview of IPS tools

Module 7: Firewalls

  • Managing threats and executing security tasks
  • Strategies for protection against hacking
  • Importance of centralization and documentation
  • Multi-layer firewall protection
  • Packet filtering and stateful packet filtering techniques
  • Implementing a multi-firewall DMZ
  • Specialty firewalls and reverse firewalls

Module 8: Packet Filtering and Proxy Servers

  • Understanding Network Address Translation (NAT)
  • Application layer gateways and proxying mechanisms
  • Virtual Private Networks (VPNs) and the authentication process

Module 9: Bastion Hosts and Honeypots

  • Understanding the Bastion Host concept
  • Honeypots and Honeynets

Module 10: Hardening Routers

  • Introduction to Internetwork Operating Systems (IOS)
  • Routine troubleshooting procedures for routers
  • Methods for hardening a router
  • Essential components of router security
  • Router security testing tools

Module 11: Hardening Operating System Security

  • Windows security fundamentals
  • Management of objects and permissions
  • NTFS file system permissions
  • Active Directory administration
  • Kerberos authentication and security
  • IP Security configurations
  • Linux security considerations

Module 12: Patch Management

  • Installation steps for the Red Hat Up2date Patch Management Utility
  • Microsoft patch management processes and Windows Update Services
  • Patch management tools: Qchain
  • Patch management tool: Microsoft Baseline Security Analyzer
  • Overview of other patch management tools

Module 13: Application Security

  • Securing web applications
  • IPSec and SSL security implementations
  • Writing secure code and adhering to best practices
  • Security in remote administration

Module 14: Web Security

  • Network devices and design principles
  • Modifying network addresses
  • Client authorization and securing client transmissions
  • Handling portable applications
  • Malicious code detection techniques
  • Configuring browser security settings
  • Common Gateway Interface (CGI)
  • Web application input data validation and mitigating buffer overflows

Module 15: E-Mail Security

  • Components of an email
  • E-mail protocols
  • E-mail security risks
  • Defensive strategies against e-mail security risks

Module 16: Encryption

  • Firewalls Implementation of encryption
  • Maintaining data confidentiality
  • Digital certificates
  • Public and private keys (including PGP)
  • Guidelines for choosing key sizes
  • Analysis of popular encryption schemes, including IPSEC

Module 17: Virtual Private Networks

  • VPN tunneling protocols
  • PPTP and L2TP
  • VPN security measures

Module 18: WLAN

  • Types of wireless networks
  • Antenna technologies
  • WLAN standards
  • Bluetooth and Ultra Wideband
  • WEP description tools (Air Snort and WEPCrack)
  • WLAN security standards: WPA, TKIP, and WTLS
  • EAP methods
  • Advanced Encryption Standards (AES), DES, and RSA encryption
  • RADIUS and multi-factor authentication
  • Mobile security through certificates
  • Certificate management via PKI

Module 19: Creating Fault Tolerance

  • Network security and fault tolerance
  • Importance of creating fault tolerance
  • Planning for fault tolerance
  • Common reasons for system failure
  • Preventive measures

Module 20: Incident Response

  • Defining what constitutes an incident
  • Step-by-step procedures
  • Managing incidents effectively
  • Defining Incident Response
  • Six-step approach for incident handling (PICERF Methodology)
  • Roles within the Incident Response Team

Module 21: Disaster Recovery and Planning

  • Understanding Disaster Recovery
  • Disaster Recovery Planning
  • Business Continuity Planning Process
  • Disaster prevention strategies

Module 22: Network Vulnerability Assessment

  • Overview of vulnerability assessment
  • Goals of vulnerability assessment
  • Network vulnerability assessment methodology:
  • Selecting appropriate vulnerability assessment tools

Requirements

There are no specific prerequisites or prior requirements needed to enroll in this course.

 35 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories